882924ce627456a1f7fc6", 0x1000}, {&(0x7f0000000180)="fa63923ca07464e8f95587ddc7cdb56a0311be79c22c9f8db4b108c3640b4cc57d72463f9a84166bad5553d371a0f0", 0x2f}, {&(0x7f00000023c0)="c82dd5ed88b05a16586491ed1ee163f1fd5932846f7df725a9d944866a09fcdb4136c6a543bc9a413c496eda335e8afca5cf59cadd9289a674014e9d0d2b4f8d409532933fe4b442783d57594f62ab3e53b1db1f78c30628840f40542aa88211510d5f5a752dc05bc2f97084fb1b17547b1815932d30f5b8033f1ebad0c2dd08565a4cf676511b4ac3a3c4a4eb80de9e661c1e6aff283ff3cc52e0f039c897e4a54de4b80d0bab951d5bf1342f9b1940e2f23580fe711706defbcf7fb15c23ee23c34b69138d003ed312bd4e21ba2e41033db0d098c3260e1077", 0xda}], 0x7, 0x0, 0x0, 0x40080008}, {0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000002540)="5f9d6cc2550d16cdae37531bc8e88684f6d2dd03ce85ca88ab54853675d1159a9482dcaf2cfb4f94994ab21db1c367fac0e6ba00e94db1b197816b3972cdda2f1d51bdd3c422cb59", 0x48}, {&(0x7f00000025c0)="d14ecc39282bdd7fd6a97e72bc5c7128a9cfe5c1784e507ba098dee13b9a6e4e6e9a9579fc0bb3c7443f5fa5610781943b526c5d0ae17807b768132d6db617e67921b5bf886db493c33cee849b27828aefe6da19a6cf3facec5302048da9791fac9559c521344640ffaf49b24b33eb942f2f8d15b5f7aff83444008c8522", 0x7e}, {&(0x7f0000002640)="71985ca4a232c545902038ce652d5be395bd5aed6ff3bdb28b1b40280fd02b9715f05a95b48883c8a2e99fca1e162831e3a954f0dfe3fceefca269333c484213e1b6c3854e2db371c260bba9ab3d4208ad5d520f978d94fd1b1a7a85970cb95db9071dfcc2daecfb2ef3ba5ac494ae455a5138", 0x73}, {&(0x7f00000026c0)="3c41ddb01a661c9b9229b234f979bdd203c697292d171fecd8c511e9515094d833d3aa1a1e629af54cf0d6a4d34929a867d30429cbff1cfd604bc8cc19e87a02d9701e83e6106a045cd6721811a1c77cb94300d6ee61cc40148b497a809c1bf75b07c58b8b92c77710ca84186d598a84822529ab5b53f055b7735e70793de53b6fc40ff09edcf3b5fce63c8fe78be3b70aba2db58587a0395c988b862b8ad497ebc985afda08904336b23de2b3d03f8a3e805650bf2ca9ed6f92", 0xba}], 0x4, 0x0, 0x0, 0x2000880}, {0x0, 0x0, &(0x7f0000002980)=[{&(0x7f00000027c0)="6261fc8a79194aedd699ce558925051637c1f66533926c92e06d05cf2c65ccf9c6669d97cb670fd9699b3fc54ebd9b6ad8b6c0e8e9fc7214ffe2ba40a527383ed76e275635c5eee94fde8af603fbff597d59172a9559d3adf6dc4e7307a1ad986e472271db015974a3cab71f2cc1c2ec3f68cb055894ce54bd6549cf1b110f2fc7d9cf3402c2bdcf347e92d63dcea44c482ef3844f7e65cb2f5dc64b12625882a2ab7a9acd04863847e704ef20dfb04590bcaa05241b030ae6f5c23ec45108d76d84f1ac80ae24", 0xc7}, {&(0x7f00000028c0)="5d88f14f529a99c904ea6e72ce5b223b9f87b37d4e4b0e993e685b27b7094a028b1a331c8c57888210eb7791825ade69a5c89a04ec79558f9ffef42b99cdce0ec428e52b5b957d5910f5bebd1ad672f8a1ebc8fabd61badaf4bcabc3b2a560469b61b2c22227e636595a4a57825001786b6b5d63adf5ff8d3e43b18ce612df1ef9e37288d18c2fb75223453167571d8b26cc09e4b1c3decb86cb9c57b98f56a21a907bb5fe", 0xa5}], 0x2, &(0x7f0000004140)=ANY=[@ANYBLOB="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"], 0x1190, 0x8010}, {0x0, 0x0, &(0x7f0000003f40)=[{&(0x7f0000003b80)="3b9b9e478fc6", 0x6}, {&(0x7f0000003bc0)="5fae209ff51540f838a4218502169e2bced73b833c5e8e1e54fa78eeed8eb18191b3d86540452809a0cb8f38d3a84cae45d99e64be254889f3be97a748d96d81b94f9678b57884231adefa367e0bbb6932152b3cb079dcbdc2d028737e86ca211be1c56bb0a9142211e67cac2e8b5835f693b4085067bdff8b4fcd896a2d6a3f6cb9458091bd4fb35994c77632f90bd8f157", 0x92}, {&(0x7f0000003c80)="2e30bb34be81409536cf17d6c7e407b9a4cb6a3d065372e47353e393713699747df4726b752ee25583cfe4b562097ba4be7081e0baf26652c33c8b9636d0cf9ea8396e65b1aa27bc314d4edf2391c536c28af00bad0fd867ccfa15e172368c", 0x5f}, {&(0x7f0000003d00)="7ec8663e8cbd2a3affa354785fa177acaf8a8c0e4be1061f9e3d59d8e11214f2f5791b5a8d4287dd5761fc74cf4c95c9a00d56cbe02a47376c45dbe5c6275c0ba97a2215cfd005322dbe4524b76ca36fb0069307dbdd292c460c2be937dd5763d42b5a4bfa04b68097bb9c374360", 0x6e}, {&(0x7f0000003d80)="48c9f76ee82f9a906892c01a699d55", 0xf}, {&(0x7f0000003dc0)="294fc16a0865a1af6c128f9b050f77cfe82adfb4e99a006d001624ed36271e69afd7b130ed5985439b1b9961e56f1479ac7acba3482b0508e0744de51d5f26398b0332fada0d1a264e6b58f346a0226a70bc477be70cc4875351955f4ec863c116133485730cef37b57975a0c04697a21fe04b8193238ac8de493e", 0x7b}, {&(0x7f0000003e40)="11335d8ba8cb1ef7370c6ad5e50fde96eca448a3e03e3408efd14920a3140cac56d66323ca8e305f99a4f8edd81d0c2b966f6a8a311ddab4f65fac0a0f3011107f2340a1f0607fa3bc8a41a4d495b977c4fbd90b0fe0fc022ccd592d4673de0a4f4e23cd2965bb8bf52dcbdf4c1d4f9c794ddf4e11", 0x75}, {&(0x7f0000003ec0)="6ef61f74a1eeb25409c0b7e4fd99b02c4441f7005f92a7f696cdb3fcf70d184e3e3f132a38d724f8cd0f7731034d35a2e997e5b68fa9115006199f2de36c991f6fb07f4c94751fa73f3dec2a0195c5", 0x4f}], 0x8, 0x0, 0x0, 0x4121}], 0x5, 0x40001) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000004100)={0x6, &(0x7f0000000000)=[{0x5, 0x4}, {0x2, 0x8}, {0x7fff, 0x9}, {0x0, 0x100}, {0x7, 0x81}, {0x1e, 0x4}]}) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000200000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000700010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000300190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010800000153b4", 0x2e}], 0x1}, 0x0) 03:49:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f0000000000)={0x1, @output={0x1000, 0x3, {0x8, 0x5}, 0x34, 0x5}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000350000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000003f0000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2262.949932] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2262.962076] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x315, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = fcntl$dupfd(r0, 0x605, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80000, 0x0) ioctl$SIOCAX25GETINFO(r3, 0x89ed, &(0x7f0000000040)) r4 = semget$private(0x0, 0x4, 0x418) semctl$IPC_INFO(r4, 0x5, 0x13, &(0x7f00000011c0)=""/4095) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x1200, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x400, 0x0) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f0000000140)={0x7faf, 0x50, 0x2, r6}) 03:49:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000400000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000500190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000800010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010900000153b4", 0x2e}], 0x1}, 0x0) [ 2263.096099] QAT: Invalid ioctl 03:49:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000640000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x20000000102, 0x0) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000000)) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000100)=[{0x4, 0x7ff}, {}, {0x0, 0xfe01}, {0x0, 0x7}, {0xd3c115cefc6d7fac, 0x5}, {0x0, 0x8}], 0x6) r3 = semget(0x3, 0x3, 0x80) semctl$IPC_INFO(r3, 0x1, 0x13, &(0x7f0000002200)=""/4092) [ 2263.192819] QAT: Invalid ioctl 03:49:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010a00000153b4", 0x2e}], 0x1}, 0x0) 03:49:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') [ 2263.466066] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000900010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000600190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x316, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2264.295452] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2264.315048] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000810000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010b00000153b4", 0x2e}], 0x1}, 0x0) 03:49:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4$inet(r3, &(0x7f0000001280)={0x2, 0x0, @remote}, &(0x7f0000001240)=0x10, 0xc0000) r5 = getpid() setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='cdg\x00', 0x4) tkill(r5, 0x800000015) fcntl$lock(r4, 0x27, &(0x7f0000000180)={0x2, 0x3, 0x100, 0x3f, r5}) setsockopt$inet6_dccp_buf(r3, 0x21, 0x0, &(0x7f0000000000)="391520a8353796d5aa6b2e33d166a60f63a66ebf1a69bcda0544d6063c1534e24d24ab63ccbe66284826dda55518267ded3cc5f1044a81166276116f291ccf60c6e3c6e6b295de56744f8fb8fce49c678f8a216ed89d75a7a17062dbe3c8fc382278d557aa3c6374f23cdd3656a2e06bb37c02bbe8f3aeca52e4a0e2f035f9f3d3b53371ffb5fe993c30fcf81f5c622c6aad1a459eefd09474b1747ea96f679a6c615c52bfaccc72e40c770ef0343b04c97b30f85e6cbca872d470e247e6ad54f0755a79857dd14ade3b3b0638c9b669612940e84e000da9c73a4e63e5e786a25a015441c33d74de78e42397192ccf4159cb", 0xf2) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EVIOCGABS3F(r7, 0x8018457f, &(0x7f00000011c0)=""/66) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPCONNDEL(r11, 0x400442c9, &(0x7f0000000100)={0x0, @remote}) 03:49:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000a00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010f00000153b4", 0x2e}], 0x1}, 0x0) 03:49:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000011000000153b4", 0x2e}], 0x1}, 0x0) 03:49:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000014800000153b4", 0x2e}], 0x1}, 0x0) 03:49:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x317, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2265.518147] validate_nla: 19 callbacks suppressed [ 2265.518158] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2265.540943] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:49:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000200010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2265.560711] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2265.577115] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2265.595502] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:49:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000700190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000b00010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2265.616831] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000014c00000153b4", 0x2e}], 0x1}, 0x0) [ 2265.875231] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:49:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000400010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000500010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2266.712547] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2266.720630] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2266.735548] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2266.753763] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2266.764085] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2266.775724] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:49:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000e00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x318, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000900190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000016000000153b4", 0x2e}], 0x1}, 0x0) 03:49:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000600010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2267.563665] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2267.597096] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2267.624378] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000800010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000f00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000016800000153b4", 0x2e}], 0x1}, 0x0) 03:49:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000a00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2268.809134] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2268.845032] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x319, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000900010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600001000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000016c00000153b4", 0x2e}], 0x1}, 0x0) [ 2269.275744] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000017400000153b4", 0x2e}], 0x1}, 0x0) 03:49:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000a00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000b00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2269.616779] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600004800010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000017a00000153b4", 0x2e}], 0x1}, 0x0) 03:49:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000b00010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2270.443211] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x31a, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2270.486588] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2270.529764] validate_nla: 16 callbacks suppressed [ 2270.529773] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2270.543088] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2270.578986] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000e00010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2270.621312] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:49:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001f000000153b4", 0x2e}], 0x1}, 0x0) 03:49:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600004c00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000e00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010003000153b4", 0x2e}], 0x1}, 0x0) 03:49:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010005000153b4", 0x2e}], 0x1}, 0x0) 03:49:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010006000153b4", 0x2e}], 0x1}, 0x0) [ 2271.878094] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2271.896220] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2271.911161] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x31b, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2271.947137] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2271.961842] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:49:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000f00010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2271.993374] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600006000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000f00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010007000153b4", 0x2e}], 0x1}, 0x0) [ 2272.535175] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2272.560816] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2272.579577] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2272.622937] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2272.647624] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600001000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600006800010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000002000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010009000153b4", 0x2e}], 0x1}, 0x0) 03:49:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000a000153b4", 0x2e}], 0x1}, 0x0) [ 2273.474805] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2273.504610] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x31c, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000004000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000b000153b4", 0x2e}], 0x1}, 0x0) [ 2273.766396] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600006000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600006c00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:20 executing program 3: r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x181000) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000180)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000001c0)) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4, 0x20000) getpeername$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f00000000c0)=0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r5, 0xc0206434, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x7}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000200)=""/4096) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VFIO_IOMMU_UNMAP_DMA(r8, 0x3b72, &(0x7f0000001200)={0x20, 0x2, 0x1ff, 0xf6c0, 0x80000000}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000100)={0x3, r6, 0x10001, 0x100000000}) semctl$IPC_INFO(0xffffffffffffffff, 0x0, 0x13, &(0x7f0000002200)=""/4113) 03:49:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000f000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2274.058012] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x80) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007d7b55a0161af80738a624665c3ae91d7d56c4de3ffbe5e440ef8eab6530"], 0x68) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600007400010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000004800190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={0x2}) 03:49:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x31d, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2274.535105] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000f000153b4", 0x2e}], 0x1}, 0x0) [ 2274.601871] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2274.697229] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2274.725256] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2274.736386] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010020000153b4", 0x2e}], 0x1}, 0x0) 03:49:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600007a00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r2 = semget$private(0x0, 0x20000000102, 0x0) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000000)) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000100)=[{0x4, 0x7ff}, {}, {0x0, 0xfe01}, {0x0, 0x7}, {0xd3c115cefc6d7fac, 0x5}, {0x0, 0x8}], 0x6) semop(r2, &(0x7f0000000000)=[{0x2, 0x2}, {}, {0x2, 0x3, 0x1800}, {0x0, 0xc8a5}], 0x4) 03:49:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x7fff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000040)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000)="883a716153feda1bfcd31d7ab5db0e6564", 0x11}, 0x68) r3 = semget$private(0x0, 0x1, 0x258) semctl$IPC_INFO(r3, 0x1, 0x13, &(0x7f00000021c0)=""/4085) 03:49:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001f22c000153b4", 0x2e}], 0x1}, 0x0) 03:49:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000005010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffff) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000004c00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2275.406753] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2275.427430] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000f000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010048000153b4", 0x2e}], 0x1}, 0x0) 03:49:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x31e, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="000002", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r4}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0)={r4, 0xfffffffc}, &(0x7f0000000100)=0x8) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="000002", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r8}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000011c0)={r5, 0x9, 0x7f, 0x0, 0xcf17, 0x8, 0x8, 0xffffff80, {r8, @in6={{0xa, 0x4e21, 0x2, @rand_addr="ac93165dd7007c2fc426eeac4ea0b82a", 0x2}}, 0xfffffc01, 0xa, 0x7, 0x400, 0x7fffffff}}, &(0x7f0000000140)=0xb0) set_mempolicy(0x1, &(0x7f0000000000)=0xf273, 0x5) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$IMSETDEVNAME(r9, 0x80184947, &(0x7f0000000080)={0x10003, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) [ 2275.824905] validate_nla: 24 callbacks suppressed [ 2275.824916] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2275.864959] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2275.883498] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2275.903080] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2275.951788] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2275.971032] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000006010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000025900190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2275.998580] sctp: [Deprecated]: syz-executor.3 (pid 7005) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2275.998580] Use struct sctp_sack_info instead 03:49:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000003010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2276.189292] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2276.228809] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2276.269384] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2276.281700] sctp: [Deprecated]: syz-executor.3 (pid 7083) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2276.281700] Use struct sctp_sack_info instead 03:49:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001004c000153b4", 0x2e}], 0x1}, 0x0) 03:49:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000009010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2276.342412] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000006000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2276.450713] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2276.511283] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2276.545275] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2276.554440] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000005010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2276.658289] sctp: [Deprecated]: syz-executor.3 (pid 7001) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2276.658289] Use struct sctp_sack_info instead 03:49:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010060000153b4", 0x2e}], 0x1}, 0x0) [ 2276.730703] sctp: [Deprecated]: syz-executor.3 (pid 7001) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2276.730703] Use struct sctp_sack_info instead 03:49:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x20000000102, 0x0) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000000)) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000100)=[{0x4, 0x7ff}, {}, {0x0, 0xfe01}, {0x0, 0x7}, {0xd3c115cefc6d7fac, 0x5}, {0x0, 0x8}], 0x6) r3 = semget$private(0x0, 0x20000000102, 0x0) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000000)) semctl$IPC_RMID(r3, 0x0, 0x0) semop(r3, &(0x7f0000000100)=[{0x4, 0x7ff}, {}, {0x0, 0xfe01}, {0x0, 0x3f}, {0xd3c115cefc6d7fac, 0x5}, {0x0, 0x8}], 0x6) semctl$IPC_INFO(r3, 0x4, 0x13, &(0x7f00000001c0)=""/4096) 03:49:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x31f, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x4001, 0x81) r4 = perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x20, 0x5, 0xfb, 0x8c, 0x0, 0x81, 0x20000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000080)}, 0x0, 0x7, 0x9, 0x6, 0x0, 0xd0, 0xc8ee}, r1, 0xa, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x5) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) [ 2277.577967] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:49:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x935) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) getpgid(r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCGDEBUG(r3, 0x80047441, &(0x7f0000000000)) 03:49:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000006800190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000a010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:24 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r6, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r9, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r9, 0xae80, 0x0) r10 = fcntl$dupfd(r9, 0x406, r6) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400201) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x320, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2278.478185] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2278.502281] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010068000153b4", 0x2e}], 0x1}, 0x0) 03:49:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000b010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000006010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SIOCX25GDTEFACILITIES(r1, 0x89ea, &(0x7f0000000100)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="d537000000000000bf00000000000000020000000100008003000000000000003f0000000000000023f1ffffffffffff0700000000000000000000000000000000000000000000000600000000000000810200000000000075000000000000000000000000000000000000000000000002120000000000000000000000000000b94b157b000000070046000000000000001000000000000000000000000000000000000000000000000300"/200]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000006c00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/\x00!v/zero\x00', 0x20840, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x0, 0x4) 03:49:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001006c000153b4", 0x2e}], 0x1}, 0x0) [ 2278.930938] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000007010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010074000153b4", 0x2e}], 0x1}, 0x0) 03:49:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000009010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:26 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x40, 0x400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) [ 2279.983973] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2280.045008] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x321, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001007a000153b4", 0x2e}], 0x1}, 0x0) [ 2280.723361] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000e010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x315101, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0xc00) fcntl$dupfd(r0, 0xe09, r4) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r8 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r8, 0xc04c5349, &(0x7f00000013c0)={0xfff, 0x400, 0xf28}) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r9}}, 0x18) r10 = getpid() tkill(r10, 0x800000015) sched_setattr(r10, &(0x7f0000001440)={0x30, 0x3, 0xadf71b030fa322ac, 0x7, 0x0, 0x0, 0x20000000, 0x60}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f00000011c0), r9, 0xb36ae5eebb189e2c}}, 0x18) 03:49:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100f0000153b4", 0x2e}], 0x1}, 0x0) 03:49:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000007400190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x322, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000a010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2280.847355] validate_nla: 15 callbacks suppressed [ 2280.847364] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:49:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCRSGCAUSE(r2, 0x89e0, &(0x7f0000000080)) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl(r3, 0x8, &(0x7f00000011c0)="85b36ae93217968157afec1ee9162a2a76bec8d9174d71e9aa5e784b6e7ffa5e9a9234a95b93d0052215c077e5f82ddfa36d0680f0183176faaf15c59a388296bb5ce8a0a76e4aef6944be6b7fe1e7ea1f39efd822dc7b9126d782283c62b0a7fe84e15d5280bb8cc6c96d6ceb1e4cafc02db743d46c569988b6d042df649e8f8282ad412b20a59fd96e0cc4af54bb77af6c3f7bec88df6b9e591d2dda90a20867fb0769bf249f93ecd40762e9133f8a0d1b21") r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r5, 0xc058560f, &(0x7f0000000140)={0x7, 0x16, 0x4, 0x40000000, {r6, r7/1000+30000}, {0x1, 0x0, 0x3, 0x1f, 0x7, 0x7f, "09b94660"}, 0xfffffc00, 0x1, @planes=&(0x7f0000000100)={0x9, 0xfffff801, @mem_offset=0x4d39d2d2, 0x1}, 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x191080, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$cgroup_subtree(r10, &(0x7f0000000040)={[{0x2b, 'io'}, {0x0, 'io'}, {0x2b, 'memory'}]}, 0x10) ioctl$EXT4_IOC_MIGRATE(r8, 0x6609) [ 2280.926704] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2280.937984] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2280.947178] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:49:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000007a00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000f010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r2 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x10000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000040)={{0x2, 0x0, @descriptor="d858752f5d441aa2"}}) 03:49:28 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x80, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x1f6fbdd4, 0xe) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001200)='/dev/ubi_ctrl\x00', 0x101000, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="000002", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r8}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000001240)={r8, 0x7}, &(0x7f0000001280)=0x8) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r9, 0x6, 0x14, &(0x7f00000011c0)=0x3, 0x4) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) renameat(r4, &(0x7f0000000100)='./file0\x00', r11, &(0x7f0000000140)='./file0\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0x7f}, 0x28, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) [ 2282.052967] sctp: [Deprecated]: syz-executor.3 (pid 8215) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2282.052967] Use struct sctp_sack_info instead [ 2282.087004] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:49:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x323, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2282.100013] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2282.109591] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2282.124942] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000b010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000012cf2000153b4", 0x2e}], 0x1}, 0x0) [ 2282.154936] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2282.170233] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:49:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600007e21010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000f000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000253b4", 0x2e}], 0x1}, 0x0) [ 2282.505486] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2282.522984] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2282.540832] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2282.549765] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2282.566492] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000e010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b000100400000000000001a0e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000003f010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000553b4", 0x2e}], 0x1}, 0x0) [ 2282.849762] sctp: [Deprecated]: syz-executor.3 (pid 8456) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2282.849762] Use struct sctp_sack_info instead 03:49:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept$inet6(r0, 0x0, &(0x7f0000000000)) recvfrom$inet6(r1, &(0x7f0000000040)=""/164, 0xa4, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x6, @mcast2, 0x2}, 0x1c) rseq(&(0x7f00000011c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xa, 0x5, 0x7, 0x5}, 0x4}, 0x20, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) creat(&(0x7f0000000140)='./file0\x00', 0x40) 03:49:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x324, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000000)="b187caa19bd001191d5d24956eb381b12d76ab886ed6d2be25367bc205920b84a2322e4996b7fe1d6fc5bcee0a5c869da86626090b7d4f135fede87121ba8ef3261c9e20466eec2193887a9527e6c96a0bd9ee512eb650c99e9f0e0233035b3fc13f66c0b4d1c3352196e2623d5a0bfd0a05cc386cd003d874150ef52c0bbe7fbc48cb30ff9d0cd0495a38fc37981fa38db44b87ef68bc680772788813e866970fbee6ddd24a416e6627fd7c4788a85c91f67efb27d95f1411d64fa75414d7141c1e8f3010885ce5655fead7200316979311b7c4cc3556df878117e0dd382be0c4b8e1e6") ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x3, 0x13, &(0x7f00000001c0)=""/4096) [ 2283.392058] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2283.420850] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2283.484460] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000040010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000200e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x4e21, 0x0, @remote, 0x10000}}}, 0x88) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000f010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000853b4", 0x2e}], 0x1}, 0x0) 03:49:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000a53b4", 0x2e}], 0x1}, 0x0) 03:49:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGPKT(r3, 0x80045438, &(0x7f0000000040)) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000002c80)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[], &(0x7f00000000c0)) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000180)={0xfff, 0x3, 0x0, 0x7fffffff, 0x101, 0x4, 0x0, 0x1, r10}, &(0x7f00000011c0)=0x20) r11 = socket$inet_udplite(0x2, 0x2, 0x88) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f0000000000)=@assoc_value, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000002cc0)={0x0, 0x8001}, &(0x7f0000002d00)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000002d40)={r13, @in6={{0xa, 0x4e23, 0x8000, @mcast2, 0x4}}, 0xfffffff8, 0x1, 0x9, 0x3aa1, 0x7ec}, &(0x7f0000002e00)=0x98) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) socket$bt_rfcomm(0x1f, 0x1, 0x3) [ 2284.244033] sctp: [Deprecated]: syz-executor.3 (pid 8812) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2284.244033] Use struct sctp_sack_info instead 03:49:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000010d53b4", 0x2e}], 0x1}, 0x0) 03:49:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sync_file_range(r0, 0x2, 0x7, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) [ 2284.740907] sctp: [Deprecated]: syz-executor.3 (pid 8704) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2284.740907] Use struct sctp_sack_info instead [ 2284.815300] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2284.826649] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000060010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x325, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000350e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000020010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x7c, &(0x7f0000000000)={@multicast1, @multicast1, @multicast1}, &(0x7f0000000040)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) [ 2285.026964] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001ffffff1f53b4", 0x2e}], 0x1}, 0x0) 03:49:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600005d3c010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000400e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000011c0)=""/4096) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000080)={0x8, 0x4, 0x5, {r3, r4+10000000}, 0x10000, 0x7}) 03:49:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000021c0)=""/4096) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4d82, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r7, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r7, 0xae80, 0x0) r8 = dup2(r4, r7) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', r10}, 0x10) r11 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x10601) r12 = socket$inet_udplite(0x2, 0x2, 0x88) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$sock_bt_hidp_HIDPCONNADD(r8, 0x400448c8, &(0x7f0000000080)={r11, r13, 0x0, 0x12, &(0x7f0000000040)="dc8c30de6fb4b2affa17d1ac36d176315a64", 0x80, 0x40, 0x9d, 0x1000, 0x9, 0xcd15f860514d0e05, 0x5, 'syz0\x00'}) 03:49:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$rose(r3, &(0x7f0000000040)=@short={0xb, @remote, @bcast, 0x1, @bcast}, &(0x7f0000000080)=0x1c, 0x101800) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), 0x4) [ 2286.346664] validate_nla: 15 callbacks suppressed [ 2286.346672] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2286.367321] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2286.379667] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000217e010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:32 executing program 3: socketpair(0x8, 0x1, 0x20, &(0x7f0000000040)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x326, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2286.395199] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2286.407775] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000011c0)=""/4096) 03:49:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000003f010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2286.449479] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:49:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000002553b4", 0x2e}], 0x1}, 0x0) [ 2286.501525] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:49:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000520e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000f0010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000003f53b4", 0x2e}], 0x1}, 0x0) 03:49:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x90c40, 0x0) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x5, 0x200) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) pread64(r4, &(0x7f00000011c0)=""/152, 0x98, 0x0) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r8, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r10, &(0x7f0000001340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001300)={&(0x7f0000001280)={0x48, r11, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x8048090}, 0x20) ioctl$KVM_RUN(r8, 0xae80, 0x0) r12 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r12, 0xae01, 0x0) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$NS_GET_OWNER_UID(r14, 0xb704, &(0x7f0000000040)) 03:49:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x327, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2287.732156] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2287.763210] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2287.775628] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2287.783231] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2287.817736] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:49:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000200190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000040010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000005253b4", 0x2e}], 0x1}, 0x0) [ 2287.853807] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000030000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req={0x6, 0x3, 0x8001, 0x5}, 0x10) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000175cc7d5953b4", 0x2e}], 0x1}, 0x0) 03:49:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x80c, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000040)=0x3, 0x4) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r4 = socket$l2tp(0x18, 0x1, 0x1) pwrite64(r4, &(0x7f0000000000)="db2233102ddec2525d5ad7838efddf581f57b6c073835cc5233a8599fa18855527556a53203fe149a72ffd1643c4a7e0a0d3c4c80ff7a905", 0x38, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f0000000080)={{0x7, 0x0, @descriptor="c021fb259074ae75"}}) 03:49:35 executing program 3: r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="06f4ea4cf8b4bc4b75fcbfabcea3a2364cee8a92932167d40bab5da734dcdbb6bde6e7d398f8d9087bfdf0ca32e81fc249a9c8401eaa1e8b2208b5e875fd1572319d7fa0ddc542daf5c329cc40f6b66465885684539b35aa20", 0x59, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f00000001c0)={'filter\x00', 0x0, 0x3, 0x16, [], 0x7, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000100)=""/154}, &(0x7f0000000240)=0xc) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getpeername$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r7, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$EVIOCGMASK(r9, 0x80104592, &(0x7f0000000540)={0x4, 0xd2, &(0x7f0000000440)="797022bc05c8c5b6f5328da140a818c765d371ff58f1c4e4f73c2da7995d8a5b0a970405afa750ad08782b414018695f6568122a885f1e3b87a14537ad1b4f05f9e7b3db6ffc9e15f2f76131a8b01b7adf11abe105fd6026c305aa066a291a588566dab6fc0165395d16d97d42040d8b10d496dac7260de43f29d07db2a0e6f69dc2059e46afeb28de6befd871497a11790abbc7331e2ca052471b582a47a68aac3fe0a8d7595eeed993e945c72c3b13169c5b59ebb227c24bacd9ae0de734f96653302c3de011df01c9590fbfa168519135"}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$FIBMAP(r7, 0x1, &(0x7f0000000400)=0x800) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000031c0)=""/4089) [ 2289.029710] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2289.043611] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x328, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2289.086001] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000000300000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000300190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000048010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x3, 0x1, 0x20) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x1f, 0x59, 0x24, 0x6, 0x1f, 0x1}}, 0xa) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000005d53b4", 0x2e}], 0x1}, 0x0) 03:49:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0xe09, r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet6_tcp_buf(r5, 0x6, 0x1a, &(0x7f0000000000)=""/136, &(0x7f00000000c0)=0x88) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000175cc7d5f53b4", 0x2e}], 0x1}, 0x0) 03:49:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000000)={0x7, 0x3, 0x9, 0xffff}, 0x10) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) [ 2290.317939] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2290.345551] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x329, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001ff) semctl$IPC_INFO(0x0, 0x2, 0x13, &(0x7f00000001c0)=""/4086) 03:49:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000003000000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000400190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000004c010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000006253b4", 0x2e}], 0x1}, 0x0) 03:49:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x4, 0x13, &(0x7f00000011c0)=""/4102) 03:49:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000006453b4", 0x2e}], 0x1}, 0x0) 03:49:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000500190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000004000000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000040)=0x2, &(0x7f0000000080)=0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) setsockopt$inet_int(r4, 0x0, 0x7, &(0x7f0000000000)=0x3, 0x4) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000007e53b4", 0x2e}], 0x1}, 0x0) 03:49:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x32a, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$ax25_SO_BINDTODEVICE(r3, 0x101, 0x19, &(0x7f0000000000)=@bpq0='bpq0\x00', 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) 03:49:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000600190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2291.738144] validate_nla: 11 callbacks suppressed [ 2291.738152] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2291.763716] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="000002", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r4}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={r4, @in6={{0xa, 0x4e22, 0x40, @dev={0xfe, 0x80, [], 0xf}, 0x6}}, 0xae89, 0x3}, &(0x7f00000000c0)=0x90) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) [ 2291.792755] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2291.822269] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600003c5d010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2291.867631] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2291.889526] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:49:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000700190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000002010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2292.070462] sctp: [Deprecated]: syz-executor.3 (pid 10675) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2292.070462] Use struct sctp_sack_info instead 03:49:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}, 0xb3b2b012dc5666e8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='vlan0\x00', 0x3ff, 0x9, 0x7fff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_PIE_ON(r3, 0x7005) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000000)) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$TIOCSSOFTCAR(r6, 0x541a, &(0x7f0000000140)=0x502) [ 2292.775028] sctp: [Deprecated]: syz-executor.3 (pid 10675) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2292.775028] Use struct sctp_sack_info instead 03:49:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000038e53b4", 0x2e}], 0x1}, 0x0) [ 2292.957145] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2292.967627] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2292.976888] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:49:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x32b, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2293.000884] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2293.017077] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2293.045823] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:49:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000060010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2293.080149] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2293.094929] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000004010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000800190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000003d853b4", 0x2e}], 0x1}, 0x0) [ 2293.477052] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2293.489642] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000068010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000900190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000005010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2293.809239] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000006010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000a00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000fe353b4", 0x2e}], 0x1}, 0x0) 03:49:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000006c010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2294.170644] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x32c, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000008010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000b00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2295.208065] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000feb53b4", 0x2e}], 0x1}, 0x0) 03:49:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000074010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2295.293808] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000e00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000009010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000ff353b4", 0x2e}], 0x1}, 0x0) [ 2296.673502] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2296.705072] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000a010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000f00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x32d, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000007a010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010002000153b4", 0x2e}], 0x1}, 0x0) [ 2296.881651] validate_nla: 19 callbacks suppressed [ 2296.881660] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2296.918510] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2296.930389] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2296.957864] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000b010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2296.987870] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2297.006979] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010003000153b4", 0x2e}], 0x1}, 0x0) [ 2298.189219] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2298.214755] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2298.222701] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000001000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2298.245140] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2298.260493] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2298.285245] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x32e, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000f0010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000e010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2298.340797] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:49:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010004000153b4", 0x2e}], 0x1}, 0x0) 03:49:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000004800190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010005000153b4", 0x2e}], 0x1}, 0x0) 03:49:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x32f, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2299.636951] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2299.648775] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2299.677063] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000004c00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010006000153b4", 0x2e}], 0x1}, 0x0) 03:49:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000f010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000030000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010007000153b4", 0x2e}], 0x1}, 0x0) [ 2300.185646] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000006000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000000300000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000006800190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2301.057474] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000010010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010008000153b4", 0x2e}], 0x1}, 0x0) 03:49:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x330, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2301.421326] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2301.480882] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000003000000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010009000153b4", 0x2e}], 0x1}, 0x0) 03:49:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000060010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000006c00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000a000153b4", 0x2e}], 0x1}, 0x0) [ 2302.235426] validate_nla: 12 callbacks suppressed [ 2302.235437] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2302.273024] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2302.291141] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2302.300841] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2302.344203] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2302.375490] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2302.488035] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:49:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000030000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000007400190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000004000000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000010d0000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2302.565283] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2302.581519] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000b000153b4", 0x2e}], 0x1}, 0x0) 03:49:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000002010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2303.102803] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2303.120717] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:49:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x331, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2303.164737] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2303.173281] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2303.239685] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:49:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000001b0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000007a00190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000f000153b4", 0x2e}], 0x1}, 0x0) [ 2303.620137] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000f000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000003010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x332, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000005902190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000200000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010010000153b4", 0x2e}], 0x1}, 0x0) 03:49:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010048000153b4", 0x2e}], 0x1}, 0x0) [ 2305.183063] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2305.215151] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x333, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000350000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000004010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000003190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001004c000153b4", 0x2e}], 0x1}, 0x0) 03:49:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010060000153b4", 0x2e}], 0x1}, 0x0) 03:49:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000005190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2306.755244] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2306.764802] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000003f0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x334, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000005010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010068000153b4", 0x2e}], 0x1}, 0x0) [ 2306.932571] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000006010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000006190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000400000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001006c000153b4", 0x2e}], 0x1}, 0x0) [ 2308.278556] validate_nla: 16 callbacks suppressed [ 2308.278565] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2308.306617] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2308.333276] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2308.348593] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:49:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x335, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000007010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2308.386627] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2308.394450] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000640000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000007190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010074000153b4", 0x2e}], 0x1}, 0x0) 03:49:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001007a000153b4", 0x2e}], 0x1}, 0x0) [ 2308.975351] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2308.996370] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2309.041632] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2309.059088] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2309.132235] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2309.181420] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:49:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000008010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000009190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000810000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2309.376465] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2309.454876] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2309.572825] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100f0000153b4", 0x2e}], 0x1}, 0x0) 03:49:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000009010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000030153b4", 0x2e}], 0x1}, 0x0) 03:49:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x336, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000000a190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2310.375012] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2310.384232] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000020000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000a010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000050153b4", 0x2e}], 0x1}, 0x0) 03:49:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000000b190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000030000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000060153b4", 0x2e}], 0x1}, 0x0) [ 2311.035858] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2311.063246] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2311.139774] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000040000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000000e190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000b010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000080000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2312.136891] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x337, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000000f190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000070153b4", 0x2e}], 0x1}, 0x0) [ 2312.212175] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000090153b4", 0x2e}], 0x1}, 0x0) 03:49:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000e010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2312.621481] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2312.707119] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:49:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000001b0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000f010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:49:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)={0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000100)=0x3f, &(0x7f0000000140)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x20000000000}) r6 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/access\x00', 0x2, 0x0) write$binfmt_elf64(r6, &(0x7f00000011c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x88, 0x6a, 0x4, 0x7dec8ec2, 0x2, 0x3, 0x9, 0x35e, 0x40, 0x3a5, 0x8, 0x81, 0x38, 0x2, 0x5, 0x5}, [{0x171cd3aabdd6c8a, 0xfff, 0x2, 0x6, 0x10001, 0x2, 0x8000, 0xfffffffffffffff9}], "70b116cea873fa13b0611276f6b90d69de091f1e79849de2c75fceacd901fdaa8ca50616b0866d328058eafb", [[]]}, 0x1a4) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000080)={r2, r5}) 03:49:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000a0153b4", 0x2e}], 0x1}, 0x0) 03:49:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x400, 0x0) connect$caif(r1, &(0x7f00000012c0)=@dgm={0x25, 0x7ff, 0x7f}, 0x18) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x40, @rand_addr="518860d8a75d124ce48ff8ca4e80d850", 0x9}, 0x1c) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:59 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000000)='./file0\x00', 0x501000, 0x9) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:49:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000350000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_adjtime(0x2, &(0x7f0000000000)={0x2e7, 0x36c000000, 0x6, 0x10, 0x200000000000000, 0x2, 0x5, 0x400, 0x8000, 0x1, 0x6, 0x10001, 0x1, 0x3, 0x8, 0x0, 0xfffffffffffffffb, 0x5e9b, 0x4, 0xa3, 0x9, 0x900000000, 0x80, 0x3, 0x80, 0xb0}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r5, 0xc0505510, &(0x7f0000001240)={0xffff, 0x2, 0x0, 0x80, &(0x7f00000011c0)=[{}, {}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) [ 2314.097598] validate_nla: 23 callbacks suppressed [ 2314.097607] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2314.113140] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2314.122629] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2314.133338] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2314.155807] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2314.179313] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2314.219556] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:50:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000020190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000010010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000b0153b4", 0x2e}], 0x1}, 0x0) 03:50:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x338, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101000, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000080)={0x10000, &(0x7f00000000c0), 0x9, r4, 0x4}) 03:50:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000640000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2314.325934] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2314.361901] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000048010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) [ 2314.626167] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2314.650970] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2314.700500] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2314.747772] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2314.770868] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:50:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000f0153b4", 0x2e}], 0x1}, 0x0) [ 2314.796564] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000040190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000004c010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/\xff\x94\x98\xf9', 0x8903, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r8, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r8, 0xae80, 0x0) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) r11 = ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r11, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r11, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r11, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x3c99e758c3da0ae, 0x2e, 0x0, 0xfffffd78) sync_file_range(r2, 0x9467, 0x9, 0x2) 03:50:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000200153b4", 0x2e}], 0x1}, 0x0) 03:50:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x20000000102, 0x0) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000000)) semctl$IPC_RMID(r2, 0x0, 0x0) semop(r2, &(0x7f0000000100)=[{0x4, 0x7ff}, {}, {0x0, 0xfe01}, {0x0, 0x7}, {0xd3c115cefc6d7fac, 0x5}, {0x0, 0x8}], 0x6) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x7}) semctl$IPC_INFO(r2, 0x0, 0x13, &(0x7f00000001c0)=""/4092) 03:50:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f00000012c0)=""/250) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x448802, 0x0) r3 = dup3(r0, r0, 0x7a5e0423049e7c75) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000013c0)={"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"}) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f00000011c0)={'vxcan1\x00', 0x400, 0x800}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000000)={0x2, 0x2, 0x2, 0x0, 0x0, [], [], [], 0x6, 0x8}) [ 2315.587740] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x339, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000d0100000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000060010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) init_module(&(0x7f0000001200)='/wlan1\x00', 0x7, &(0x7f0000001240)='/selinux/avc/cache_threshold\x00') r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000001c0)=0xffffffffffffffff, 0x12) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0xa3191b68cfeefa4e, 0x7, [@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @dev={[], 0x2a}, @broadcast, @dev={[], 0x2b}, @empty, @broadcast]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r4, 0x40045731, &(0x7f00000011c0)=0x10000) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40000, 0x4) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$IOC_PR_REGISTER(r10, 0x401870c8, &(0x7f00000013c0)={0x4, 0x2}) r11 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001340)='/dev/vcs\x00', 0x480040, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r11, 0x84, 0x7, &(0x7f0000001380)={0xc5d7}, 0x4) sendmsg$IPVS_CMD_ZERO(r7, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x28000006}, 0xc, &(0x7f0000000140)={&(0x7f0000001280)=ANY=[@ANYBLOB="f2ff84d167ca342f", @ANYRES16=r8, @ANYBLOB="080025bd7000fedbdf25100000004c000100080008000100008014000300e0000001000000000000000000000000140003007f00000100000000000000000000000008000800ff00000008000b007369700008000800090000005000030014000600ff02000000000000000000000000000108000800040000001400060000000000000000000000ffffe000000114000200697036677265746170300000000000000800080000000000080004000600000004000200"], 0xbc}, 0x1, 0x0, 0x0, 0x40000}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000000)) [ 2316.437911] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000000300000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000048190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2316.485111] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100f22c0153b4", 0x2e}], 0x1}, 0x0) 03:50:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000068010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000480153b4", 0x2e}], 0x1}, 0x0) 03:50:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x33a, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000001fffffff0153b4", 0x33fe0}], 0x1}, 0x0) 03:50:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e22, @multicast1}}, 0x0, 0x800, 0x0, "c29fe865210fd91171fd9acdc549d6105e7036266f18dd343c45f5b8114c0164ba7a4041a16c8d6e5c29d75399f61e1b3935804c58d82d5041a789d3914e585868a0b82c993497472e2201810009364c"}, 0xd8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:50:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100004c0153b4", 0x2e}], 0x1}, 0x0) [ 2317.115165] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000006c010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000004c190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2317.409232] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000040053b4", 0x33fe0}], 0x1}, 0x0) 03:50:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000259190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000074010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) eventfd(0x4) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:50:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000600153b4", 0x2e}], 0x1}, 0x0) 03:50:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7ff, 0x200c00) r3 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x2, 0x400000) setsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000140)={0xd6, 0x2, 0x9, 0x1, 0x0, 0x80, 0x6, 0x3, 0x7, 0x3, 0x3f}, 0xb) ioctl$VIDIOC_G_FBUF(r2, 0x8030560a, &(0x7f00000000c0)={0x2, 0x6, &(0x7f0000000040)="e5159d78db2f939705a40b871fcedc02acb3968b9bb53446c8e13d76de12d3be3fa08826f331f01095f612ce392eac59826e12e42b3388abb4f45b08ab9cf23f1a25754950f4e1dd2dbb7e9331a05e6d7fa06594306fa20d970328c879dc", {0x2, 0x3, 0x3436324d, 0x0, 0x1, 0x5, 0x6, 0x80000000}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) [ 2317.922707] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x33b, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x411017e, r0, 0x44b8000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$mouse(&(0x7f00000031c0)='/dev/input/mouse#\x00', 0x3ff, 0x200040) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000003200)={0x8, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e23, @rand_addr=0x7}}}, 0x108) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4084) 03:50:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010200000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000007a010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000060190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000680153b4", 0x2e}], 0x1}, 0x0) [ 2318.281483] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010400000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000030000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000068190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:05 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r3, 0xae80, 0x0) write$binfmt_misc(r3, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], 0x45) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4091) 03:50:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100006c0153b4", 0x2e}], 0x1}, 0x0) 03:50:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="000002", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="41010000", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r4}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={r4, 0x4}, &(0x7f0000000040)=0x8) [ 2318.918135] sctp: [Deprecated]: syz-executor.3 (pid 16346) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2318.918135] Use struct sctp_sack_info instead 03:50:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x33c, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000740153b4", 0x2e}], 0x1}, 0x0) [ 2319.025189] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010500000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000050000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000006c190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2319.208204] validate_nla: 30 callbacks suppressed [ 2319.208215] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2319.301144] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2319.335567] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100007a0153b4", 0x2e}], 0x1}, 0x0) 03:50:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000f00153b4", 0x2e}], 0x1}, 0x0) [ 2319.679677] sctp: [Deprecated]: syz-executor.3 (pid 16671) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2319.679677] Use struct sctp_sack_info instead [ 2319.758413] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2319.778138] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2319.806521] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:50:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(0x0, &(0x7f0000000380)={'syz', 0x0, 0xff}, &(0x7f00000003c0)='(^\x00', r2) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat(r5, &(0x7f0000000080)='./file0\x00', 0x20000, 0x9) keyctl$get_keyring_id(0x0, r3, 0x1) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000100)={0x0, 0x7fff, 0x1f, [], &(0x7f00000000c0)=0x1}) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) [ 2319.841965] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2319.879938] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:50:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010600000153b4", 0x33fe0}], 0x1}, 0x0) [ 2319.943787] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000090000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x33d, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2320.017762] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2320.115943] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:50:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000074190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2320.159259] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2320.196168] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2320.258537] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget(0x0, 0x4, 0x52b) semctl$IPC_INFO(r2, 0x1, 0x13, &(0x7f00000001c0)=""/4096) 03:50:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001002cf20153b4", 0x2e}], 0x1}, 0x0) 03:50:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000a0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010800000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x2ec, [0x0, 0x200011c0, 0x200011f0, 0x20001220], 0x0, &(0x7f0000000040), &(0x7f00000011c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x0, 0x1, 0x88e5, 'bridge_slave_1\x00', 'lapb0\x00', 'caif0\x00', 'ifb0\x00', @local, [0x0, 0x0, 0x1fe, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0xff, 0x0, 0xff], 0xb6, 0xb6, 0xfe, [@ip={'ip\x00', 0x20, {{@dev={0xac, 0x14, 0x14, 0x1b}, @broadcast, 0x0, 0xffffffff, 0x0, 0x1d, 0x2, 0x29, 0x4e23, 0x4e24, 0x4e23, 0x4e20}}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x5, 0x2c, 0x5}}}}, {0x5, 0x0, 0x4, 'syz_tun\x00', 'batadv0\x00', 'ip6gretap0\x00', 'team0\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1e}, [0x0, 0x0, 0x0, 0xff, 0xff], 0xf6, 0x12e, 0x15e, [@ip={'ip\x00', 0x20, {{@loopback, @remote, 0xff000000, 0xffffff00, 0xc1, 0x2a, 0x4, 0x2, 0x4e22, 0x4e20, 0x4e22, 0x4e24}}}, @connbytes={'connbytes\x00', 0x18, {{0x8, 0x1, 0x2}}}], [@common=@mark={'mark\x00', 0x10, {{0xffffffc0, 0xffffffffffffffff}}}], @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x5}}}}]}]}, 0x364) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:50:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x3, 0x100) semctl$IPC_INFO(r2, 0x0, 0x13, &(0x7f0000002200)=""/4108) 03:50:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000030053b4", 0x2e}], 0x1}, 0x0) [ 2320.855740] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:50:07 executing program 3: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000040)="91252ea86527c8cb4df52e7e88feb65c368bf090e5d2c7efc1ae7b18949424252e4c040a49a652afacc4c00816c0a621") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='bfs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) pwrite64(r4, &(0x7f0000000080)="1025116b6527037c009d96a15f56a8bb31925b2ec4b055853f5e3995", 0x1c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) [ 2321.252983] block nbd3: Attempted send on invalid socket [ 2321.259155] print_req_error: I/O error, dev nbd3, sector 0 [ 2321.429021] block nbd3: Attempted send on invalid socket [ 2321.434632] print_req_error: I/O error, dev nbd3, sector 0 03:50:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:50:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000000)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001440)={0x2a4, r2, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8c7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffb49a}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}]}, @TIPC_NLA_BEARER={0xfc, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14b6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd1e3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd245}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x4, @mcast2, 0x80000001}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'teql0\x00'}}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10200}]}, @TIPC_NLA_LINK={0x60, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8, @ipv4={[], [], @multicast2}, 0x4b}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x3, @rand_addr="264caa2888aaf4fef3cebfc15cbc0a48", 0x4}}}}]}]}, 0x2a4}, 0x1, 0x0, 0x0, 0x4000008}, 0x20000000) semctl$IPC_INFO(0x0, 0x0, 0x13, &(0x7f00000001c0)=""/4096) 03:50:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x33e, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2321.785830] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2321.804801] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000007a190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010900000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000010d0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000040053b4", 0x2e}], 0x1}, 0x0) 03:50:08 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r2}]]}}}]}, 0x38}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x20}}, 0x0) 03:50:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000020153b4", 0x2e}], 0x1}, 0x0) 03:50:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010a00000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000030153b4", 0x2e}], 0x1}, 0x0) 03:50:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010b00000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:09 executing program 3: clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x3f, 0x0, 0x0, 0x3, 0x114, 0xffffffffffffffff}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) creat(&(0x7f0000000040)='./bus\x00', 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 03:50:09 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0xfffffffffffffffb, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xf17) unshare(0x40040400) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="e54e000000000000000008000095f6a78acb1fb1b80062726f6164634273742d6c696e6b58043842bb657558ec3c509751efac54"], 0x3}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18c01020}, 0xc, &(0x7f0000000480)={&(0x7f0000000640)={0x10c, r2, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x971}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8, @remote, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x46bf}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6c}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x444}, 0x80) vmsplice(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000540)="07332dddc13e9928dbc3c2e194f4612185b3759b732073a8042e169f66abeb7bd884d984fa158df07801dfcd0519d83f548103d56e5c4ae29ee82af5aebe536a6968636fba5b2a845945c34d8929d59e5aa9649fb24f708211d36226a00fee65bf10a4cb5b2ba10b0c061159c3b9b531e4f6c5579861f481ed9aae949a45bdd8db84d97e8c4cfb4e47bad4fd3565146be3c28fbe202d99ef73e4bf4d9577496c892482919fca374f92a5876e6d5228db20a539cd2c67794dc6ae7311696ec8e952d8d32a4a83dd363a9a5807caf438bbe81bdd", 0xd3}], 0x10000000000000ab, 0xc) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) waitid(0x0, 0x0, &(0x7f0000001ff0), 0x5, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r4, &(0x7f0000000280)=[{&(0x7f0000000040)=""/17, 0x11}, {&(0x7f00000001c0)=""/170, 0xaa}], 0x10000000000001d7) write$selinux_validatetrans(r4, &(0x7f0000000280)={'system_u:object_r:iptables_conf_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x0, 0x20, '/usr/sbin/cups-browsed\x00'}, 0x60) [ 2323.085124] ptrace attach of "/root/syz-executor.3"[17372] was attempted by "/root/syz-executor.3"[17373] [ 2323.118891] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x33f, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2323.145098] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b000100400000000000f0190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000250000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010e00000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000040153b4", 0x2e}], 0x1}, 0x0) [ 2323.336135] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2323.413926] IPVS: ftp: loaded support on port[0] = 21 03:50:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000050153b4", 0x2e}], 0x1}, 0x0) 03:50:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010f00000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000060153b4", 0x2e}], 0x1}, 0x0) [ 2324.201621] IPVS: ftp: loaded support on port[0] = 21 03:50:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000011000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x340, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2324.691759] validate_nla: 13 callbacks suppressed [ 2324.691767] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2324.708352] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2324.730498] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:50:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000350000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2324.774862] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2324.818508] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2324.904163] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2325.146667] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2325.164685] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:24 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "54bffdd1af55e93f4aa2216eb542af87"}, 0x20) 03:50:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000002190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000016000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000070153b4", 0x2e}], 0x1}, 0x0) 03:50:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000003f0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x341, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2337.626419] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2337.636977] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2337.672696] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2337.682849] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2337.694681] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2337.705371] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2337.718695] SELinux: policydb version -771899564 does not match my version range 15-31 03:50:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000003190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2337.763847] SELinux: failed to load policy [ 2337.782293] SELinux: policydb version -771899564 does not match my version range 15-31 03:50:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000080153b4", 0x2e}], 0x1}, 0x0) [ 2337.811389] SELinux: failed to load policy 03:50:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000400000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:24 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:50:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000090153b4", 0x2e}], 0x1}, 0x0) 03:50:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(0x0) socket(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x40000, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f00000001c0)=0x1) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r3 = socket$kcm(0x29, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x10005, 0x0) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x35) ftruncate(r6, 0x200004) sendfile(r1, r6, 0x0, 0x80001d00c0d0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="0100285c48d1fa8c577deb00aa5300009650cc00631c67f810", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000300)={r7}, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0xa) [ 2338.929107] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2338.952794] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:50:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x342, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001f000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000004190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2339.186917] device nr0 entered promiscuous mode [ 2339.207007] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2339.232721] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000520000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2339.257441] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2339.273713] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000a0153b4", 0x2e}], 0x1}, 0x0) 03:50:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000b0153b4", 0x2e}], 0x1}, 0x0) 03:50:26 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, &(0x7f0000000600)) [ 2339.649413] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2339.672294] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:50:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010005000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000005190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) dup3(r0, r1, 0x0) [ 2339.846698] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2339.903156] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000005d0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001140)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x18, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="086310400000000000d6000000000000008cd60011634840"], 0x0, 0x0, 0x0}) [ 2340.338924] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x343, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010006000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000f0153b4", 0x2e}], 0x1}, 0x0) 03:50:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000006190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:27 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 03:50:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000620000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000007190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000630000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000010000000000000092"]) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 03:50:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000100153b4", 0x2e}], 0x1}, 0x0) [ 2341.624708] audit: type=1804 audit(2000001028.180:203): pid=18751 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir001740645/syzkaller.D3v9sg/4279/file0/bus" dev="sda1" ino=17014 res=1 03:50:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$P9_RSYMLINK(r2, &(0x7f0000000100)={0x14}, 0xffffff75) [ 2341.765715] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010009000153b4", 0x33fe0}], 0x1}, 0x0) [ 2342.257748] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2342.287928] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2342.353320] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x344, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000008190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000640000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000480153b4", 0x2e}], 0x1}, 0x0) 03:50:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001000a000153b4", 0x33fe0}], 0x1}, 0x0) [ 2342.822228] validate_nla: 13 callbacks suppressed [ 2342.822237] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:50:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000068010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2342.913456] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2342.983701] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:50:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000009190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000007e0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001000b000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100004c0153b4", 0x2e}], 0x1}, 0x0) [ 2343.561880] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 2343.574094] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2343.584876] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2343.598904] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:50:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x345, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2343.618797] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2343.654194] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:50:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000b010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2343.684637] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2343.692761] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2343.728273] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2343.768101] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2343.789366] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000000a190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2343.833423] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:50:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000810000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000600153b4", 0x2e}], 0x1}, 0x0) 03:50:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001000e000153b4", 0x33fe0}], 0x1}, 0x0) [ 2344.110327] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2344.140125] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000000b190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000b010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000680153b4", 0x2e}], 0x1}, 0x0) 03:50:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000038e0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100006c0153b4", 0x2e}], 0x1}, 0x0) 03:50:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x346, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000740153b4", 0x2e}], 0x1}, 0x0) 03:50:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100007a0153b4", 0x2e}], 0x1}, 0x0) 03:50:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001000f000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000000e190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2345.475135] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2345.498801] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2345.515144] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000b010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000003d80000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000353b4", 0x2e}], 0x1}, 0x0) 03:50:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x347, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000017e21000153b4", 0x33fe0}], 0x1}, 0x0) [ 2345.968572] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2346.000440] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2346.016100] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000fe30000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2346.102324] syz-executor.2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 03:50:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000000f190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000f00010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2346.266202] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2346.325654] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 2346.349482] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2346.369216] CPU: 1 PID: 19761 Comm: syz-executor.2 Not tainted 4.19.81 #0 [ 2346.376191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2346.385929] Call Trace: [ 2346.388529] dump_stack+0x172/0x1f0 [ 2346.392170] dump_header+0x15e/0xa55 [ 2346.395894] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2346.400999] ? ___ratelimit+0x60/0x595 [ 2346.404903] ? do_raw_spin_unlock+0x57/0x270 [ 2346.409315] oom_kill_process.cold+0x10/0x6ef [ 2346.414166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2346.419725] ? task_will_free_mem+0x139/0x6e0 [ 2346.424243] out_of_memory+0x362/0x1330 [ 2346.428224] ? lock_downgrade+0x880/0x880 [ 2346.432381] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2346.437587] ? oom_killer_disable+0x280/0x280 [ 2346.442082] ? find_held_lock+0x35/0x130 [ 2346.446155] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2346.451002] ? memcg_event_wake+0x230/0x230 [ 2346.455331] ? do_raw_spin_unlock+0x57/0x270 [ 2346.459744] ? _raw_spin_unlock+0x2d/0x50 [ 2346.463902] try_charge+0xef7/0x1480 [ 2346.467617] ? percpu_ref_tryget_live+0xef/0x290 [ 2346.472386] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2346.477235] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2346.482083] ? find_held_lock+0x35/0x130 [ 2346.486153] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2346.491006] memcg_kmem_charge_memcg+0x83/0x170 [ 2346.495684] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2346.500193] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2346.505038] memcg_kmem_charge+0x136/0x370 [ 2346.509281] __alloc_pages_nodemask+0x3c3/0x750 [ 2346.513953] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2346.518991] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2346.523597] ? trace_hardirqs_on+0x67/0x220 [ 2346.527927] copy_process.part.0+0x3e0/0x7a30 [ 2346.532428] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2346.537538] ? delayacct_end+0x5c/0x100 [ 2346.541519] ? __delayacct_freepages_end+0xe0/0x140 [ 2346.546550] ? __lock_acquire+0x6ee/0x49c0 [ 2346.550799] ? __cleanup_sighand+0x70/0x70 [ 2346.555041] ? mark_held_locks+0x100/0x100 [ 2346.559296] _do_fork+0x257/0xfd0 [ 2346.562756] ? fork_idle+0x1d0/0x1d0 [ 2346.566479] ? blkg_prfill_rwstat_field_recursive+0x100/0x100 [ 2346.572374] ? kasan_check_read+0x11/0x20 [ 2346.576533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2346.581293] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2346.586049] ? do_syscall_64+0x26/0x620 [ 2346.590036] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2346.595408] ? do_syscall_64+0x26/0x620 [ 2346.599392] __x64_sys_clone+0xbf/0x150 [ 2346.603381] do_syscall_64+0xfd/0x620 [ 2346.607208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2346.612404] RIP: 0033:0x45c919 [ 2346.615610] Code: ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8c fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 2346.634663] RSP: 002b:00007ffd22df9578 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 2346.642446] RAX: ffffffffffffffda RBX: 00007ff94d005700 RCX: 000000000045c919 [ 2346.649838] RDX: 00007ff94d0059d0 RSI: 00007ff94d004db0 RDI: 00000000003d0f00 [ 2346.657134] RBP: 00007ffd22df9790 R08: 00007ff94d005700 R09: 00007ff94d005700 [ 2346.664417] R10: 00007ff94d0059d0 R11: 0000000000000202 R12: 0000000000000000 03:50:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000feb0000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2346.671698] R13: 00007ffd22df962f R14: 00007ff94d0059c0 R15: 000000000075c07c 03:50:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000010190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000553b4", 0x2e}], 0x1}, 0x0) 03:50:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001003f000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000000f190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2346.750111] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2346.787446] Task in /syz2 killed as a result of limit of /syz2 [ 2346.804156] memory: usage 307060kB, limit 307200kB, failcnt 4137 [ 2346.835239] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2346.842922] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000ff30000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2346.852725] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2346.869578] Memory cgroup stats for /syz2: cache:0KB rss:161520KB rss_huge:137216KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:161716KB inactive_file:0KB active_file:0KB unevictable:0KB 03:50:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000048190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2346.980672] Memory cgroup out of memory: Kill process 3329 (syz-executor.2) score 1113 or sacrifice child [ 2346.987873] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2346.998568] Killed process 3329 (syz-executor.2) total-vm:72720kB, anon-rss:2216kB, file-rss:35800kB, shmem-rss:0kB 03:50:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x348, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x257, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010040000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000a53b4", 0x2e}], 0x1}, 0x0) 03:50:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000020000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000004c190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010060000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000060190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000030000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000010d53b4", 0x2e}], 0x1}, 0x0) 03:50:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x257, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2348.156088] validate_nla: 32 callbacks suppressed [ 2348.156098] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2348.186174] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2348.201174] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2348.217165] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000068190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2348.254370] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2348.277010] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x349, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001217e000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000050000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000002553b4", 0x2e}], 0x1}, 0x0) 03:50:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x257, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2349.250403] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:50:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000006c190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000100f0000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000003f53b4", 0x2e}], 0x1}, 0x0) 03:50:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000050000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2350.108119] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2350.133338] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000080000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2350.374732] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2350.386485] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2350.406479] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2350.429514] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2350.484045] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:50:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000253b4", 0x33fe0}], 0x1}, 0x0) 03:50:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000005253b4", 0x2e}], 0x1}, 0x0) [ 2351.302037] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000074190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000005d53b4", 0x2e}], 0x1}, 0x0) 03:50:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000050000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x34a, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000090000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000353b4", 0x33fe0}], 0x1}, 0x0) [ 2351.383011] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b0001004000000000007a190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000480000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2351.502933] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000006253b4", 0x2e}], 0x1}, 0x0) 03:50:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000a0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000006453b4", 0x2e}], 0x1}, 0x0) [ 2351.865708] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000453b4", 0x33fe0}], 0x1}, 0x0) 03:50:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b000100400000000000001a0e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b0001004000000a000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x34b, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2352.729794] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2352.742705] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2352.765747] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000200e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000250000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000007e53b4", 0x2e}], 0x1}, 0x0) 03:50:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040001000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000853b4", 0x33fe0}], 0x1}, 0x0) 03:50:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000038e53b4", 0x2e}], 0x1}, 0x0) [ 2353.176158] validate_nla: 20 callbacks suppressed [ 2353.176169] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2353.212693] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2353.230003] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2353.267721] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2353.276452] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000350000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2353.324657] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2353.333265] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 2353.349322] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000010d53b4", 0x33fe0}], 0x1}, 0x0) [ 2353.385384] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2353.406121] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000f00000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000003d853b4", 0x2e}], 0x1}, 0x0) 03:50:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000520000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2354.025082] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2354.032587] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 2354.045693] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2354.072361] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2354.106352] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x34c, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000fe353b4", 0x2e}], 0x1}, 0x0) 03:50:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000001b53b4", 0x33fe0}], 0x1}, 0x0) 03:50:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000350e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000100000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000005d0000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2354.331034] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2354.428715] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2354.492554] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001ffffff1f53b4", 0x33fe0}], 0x1}, 0x0) 03:50:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000080000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000feb53b4", 0x2e}], 0x1}, 0x0) 03:50:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000400e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000ff353b4", 0x2e}], 0x1}, 0x0) [ 2355.044873] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2355.075592] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2355.137642] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b000100405d3c00000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2355.333925] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2355.375309] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x34d, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000620000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) flock(r2, 0x71a4e45a1ff9bc13) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000140), &(0x7f00000001c0)=0x4) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r6, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r9, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r9, 0xae80, 0x0) accept$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev}, &(0x7f0000000100)=0x10) r10 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r11, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) 03:50:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000253b4", 0x2e}], 0x1}, 0x0) 03:50:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000002053b4", 0x33fe0}], 0x1}, 0x0) 03:50:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000520e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2356.027079] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2356.058961] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000630000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000553b4", 0x2e}], 0x1}, 0x0) 03:50:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000853b4", 0x2e}], 0x1}, 0x0) 03:50:43 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@nls={'nls', 0x3d, 'cp857'}}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="000002", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r4}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000000)={r4, 0x5}, &(0x7f0000000040)=0x8) [ 2356.988768] hfsplus: unable to find HFS+ superblock [ 2357.237850] hfsplus: unable to find HFS+ superblock [ 2357.275823] sctp: [Deprecated]: syz-executor.3 (pid 22329) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2357.275823] Use struct sctp_sack_info instead 03:50:43 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup(r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000080)="fcda7e1504683bf254c6720ed971b0ff5ce1febe9130f8c8cc86fb3009983cb9d21e580160eac792da41c170a6503d6c55e4cc5a91ef486cd33ba43d1e493bd485be5d91c9374a30d097b3f92ede61f50faa5f8eabb84dec58082c3a289d0634e714a35398923fae96d59eef74778c45bd7feb533a", 0x75) r4 = getpid() tkill(r4, 0x800000015) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x7, 0x3, 0x98, 0x0, 0x8, 0x2000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6d, 0x0, @perf_config_ext={0x1bb1, 0x3f}, 0xa807, 0x0, 0x8, 0x1, 0x3, 0x1ff, 0xd8b9}, r4, 0xc, 0xffffffffffffffff, 0xf7dc296d3b5dcf47) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 2357.326410] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2357.360213] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b000100400000000000001a0e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x34e, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000003553b4", 0x33fe0}], 0x1}, 0x0) 03:50:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000640000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000a53b4", 0x2e}], 0x1}, 0x0) 03:50:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000003f53b4", 0x33fe0}], 0x1}, 0x0) 03:50:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000002553b4", 0x2e}], 0x1}, 0x0) 03:50:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000350e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x34f, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2358.612949] validate_nla: 20 callbacks suppressed [ 2358.612957] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2358.639341] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2358.653782] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2358.683520] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2358.698801] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000007e0000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2358.728131] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:50:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000004053b4", 0x33fe0}], 0x1}, 0x0) [ 2358.995461] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2359.012970] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2359.041879] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2359.827634] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2359.838398] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2359.847906] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:50:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000007e0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000005253b4", 0x2e}], 0x1}, 0x0) 03:50:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000520e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x350, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000006453b4", 0x33fe0}], 0x1}, 0x0) 03:50:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000d0100000153b4", 0x33fe0}], 0x1}, 0x0) [ 2360.647143] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2360.689267] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000005d53b4", 0x2e}], 0x1}, 0x0) [ 2360.874882] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2360.892339] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000000300000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000008153b4", 0x33fe0}], 0x1}, 0x0) 03:50:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b000100400000000000001903000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2361.075231] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2361.094486] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:47 executing program 3: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x519b82f868243ddc) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$isdn(r2, &(0x7f0000000080)={0x5, 0x0, "80ddae7163cd4242f01ac038e566ece6f69d8e3ec27bdd090c2cb9cf84df8009ef98f6d32a6200cc236f5ee99ab313512ca3d692ef9d44ba977a8c2e091c27d5da5d8ba3"}, 0x4c, 0x40000, 0x0, 0x0) symlinkat(&(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000000)='./file0\x00') ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000040)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000200)={'icmp\x00'}, &(0x7f0000000240)=0x1e) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f0000000280)={r7, 0x0, 0x9, 0x4}) mmap$usbmon(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000015, 0x16, r4, 0x12) 03:50:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000191a000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000006253b4", 0x2e}], 0x1}, 0x0) 03:50:48 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 2361.777649] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2361.796004] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x351, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2361.828108] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2361.842706] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000008e0300000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b000100400000000000001935000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010002000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000006453b4", 0x2e}], 0x1}, 0x0) 03:50:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000007e53b4", 0x2e}], 0x1}, 0x0) [ 2362.256825] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000d80300000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000e30f00000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000125b4", 0x2e}], 0x1}, 0x0) [ 2363.147621] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2363.163911] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x352, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010004000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b000100400000000000001952000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2363.197773] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000eb0f00000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xfffffffffffff001, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f00000004c0)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x2000000000000011, 0x2, r1, 0x0) getpid() write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB=')\x00\x00\x007\x00'/24, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x2d) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() ptrace(0xffffffffffffffff, r4) r5 = getpid() tkill(r5, 0x800000015) r6 = getpid() tkill(r6, 0x800000015) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) r7 = getpid() tkill(r7, 0x800000015) r8 = getpid() tkill(r8, 0x800000015) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)) r9 = getpid() tkill(r9, 0x800000015) ptrace$getregset(0x4205, r9, 0x67fffe4960e4c043, 0x0) write$P9_RGETLOCK(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="2900000037000000030000000000f0ff0000000055e04500", @ANYRES32=r4, @ANYBLOB="0b005f5263b1519067546e6700"], 0x29) bind$inet(r3, &(0x7f0000000300)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000180)=@urb_type_control={0x2, {0xf}, 0xffff0000, 0xc0, &(0x7f0000000040)={0x2, 0x1}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)}) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/exec\x00', 0x2, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r11 = getpid() ptrace(0xffffffffffffffff, r11) ptrace$getregset(0x4205, r11, 0x2, 0x0) write$P9_RGETLOCK(r10, &(0x7f00000002c0)=ANY=[@ANYBLOB="290000003700000001e4cb51bfaa3a2d5d48a413cff40952040000", @ANYRES32=r11, @ANYBLOB='\v\x00/dev/hwrng\x00'], 0x29) ioctl$TIOCGPGRP(r10, 0x540f, &(0x7f00000001c0)=0x0) ioprio_get$pid(0x1, r12) r13 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x101000, 0x0) ioctl$PPPIOCATTCHAN(r13, 0x40047438, &(0x7f0000000280)=0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.swap.current\x00', 0x7a05, 0x1700) r14 = getpid() ptrace(0xffffffffffffffff, 0x0) ptrace$getregset(0x4205, r14, 0x2, 0x0) r15 = socket$inet_udplite(0x2, 0x2, 0x88) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r18 = ioctl$KVM_CREATE_VM(r17, 0xae01, 0x0) r19 = ioctl$KVM_CREATE_VCPU(r18, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r19, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r19, 0xae80, 0x0) write$P9_RGETLOCK(r16, &(0x7f00000005c0)=ANY=[@ANYRES64=r19, @ANYPTR, @ANYBLOB="0b002f6465762f6877726e67000ba24c83a5c243e85c789818695ff9cea5f00da50d44098cb2625b9121ea6282bf29f62eeab9b84c41efa8f7c68605ea94b046684a83a1a4ba4e404857450331b729648f3e10f61fc2b4a28817718e8a14c866ceaa6929aa30efcfb47be45a34343b698c604fc593749451e361e36a5f1728526375d388e3"], 0x95) r20 = getpgid(0x0) getpgid(r20) 03:50:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000162b4", 0x2e}], 0x1}, 0x0) 03:50:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x353, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2364.347745] validate_nla: 17 callbacks suppressed [ 2364.347754] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2364.369904] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2364.383217] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2364.391861] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2364.405839] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b000100400000000000001964000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010005000153b4", 0x33fe0}], 0x1}, 0x0) [ 2364.440646] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2364.465030] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000f30f00000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0xa}], 0x1}, 0x0) [ 2364.705385] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2364.729282] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2364.747413] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2364.802621] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2364.843022] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e020600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010006000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0xf}], 0x1}, 0x0) 03:50:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000597dcc750153b4", 0x33fe0}], 0x1}, 0x0) 03:50:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010008000153b4", 0x33fe0}], 0x1}, 0x0) [ 2365.725589] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2365.738161] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2365.748367] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2365.772524] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:50:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r4, 0xae80, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0xc0800, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getpeername$netrom(r7, &(0x7f0000000100)={{0x3, @netrom}, [@default, @rose, @rose, @netrom, @netrom, @null, @null, @netrom]}, &(0x7f00000001c0)=0x48) r8 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r8, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bind$unix(r9, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x6, 0x1, @remote}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) sendto$inet6(r10, &(0x7f0000000080), 0xffffffffffffffde, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 03:50:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x354, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e030600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x14}], 0x1}, 0x0) 03:50:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010009000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000005f7dcc750153b4", 0x33fe0}], 0x1}, 0x0) [ 2366.422878] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2366.453411] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 03:50:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000001fffffff0153b4", 0x33fe0}], 0x1}, 0x0) 03:50:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e040600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x25}], 0x1}, 0x0) 03:50:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x30}], 0x1}, 0x0) 03:50:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00"/189], 0x5) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @initdev, @multicast2}, &(0x7f0000000180)=0xc) bind$can_raw(r2, &(0x7f00000001c0)={0x1d, r4}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000680)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000fdfffffffffffffffd06000000040000000000090000000000000000000000000000000000000000000000000000000000000020000000030000000500000000000000ffffff7f000000000100008000"/192]) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 03:50:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x52}], 0x1}, 0x0) 03:50:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x355, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001000a000153b4", 0x33fe0}], 0x1}, 0x0) [ 2367.765268] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2367.774232] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2367.793602] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e050600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2367.849260] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000040053b4", 0x33fe0}], 0x1}, 0x0) 03:50:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x62}], 0x1}, 0x0) 03:50:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) io_setup(0x0, 0x0) io_submit(0x0, 0x0, 0x0) setfsgid(0x0) pipe(&(0x7f0000000200)) syz_open_dev$rtc(&(0x7f0000000340)='/dev/rtc#\x00', 0x0, 0x431200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) r2 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r3 = dup(r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x24000, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x2241, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) dup2(r5, r6) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000380), 0xffffffffffffff9c) write$P9_RFLUSH(r3, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) 03:50:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001000b000153b4", 0x33fe0}], 0x1}, 0x0) [ 2368.926828] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:50:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x356, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2368.967897] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2368.985512] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2368.994930] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e060600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010200000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001000e000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0xc0}], 0x1}, 0x0) [ 2369.142944] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2369.162160] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e070600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010300000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x223}], 0x1}, 0x0) [ 2369.445465] validate_nla: 15 callbacks suppressed [ 2369.445475] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2369.513878] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2369.532072] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2369.559660] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 03:50:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001000f000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0xec0}], 0x1}, 0x0) [ 2369.821407] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2369.850195] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2369.871154] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f757328a156786174743f000022d320c207d09e492c2a8f7c603d176efe72b58b687aed98b29bb320ae7d1c00feedf173b055d06ee20f036004"]) 03:50:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e080600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2370.283623] EXT4-fs (loop3): Unrecognized mount option "nous(¡Vxatt?" or missing value [ 2370.393142] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2370.408663] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2370.452683] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2370.473448] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2370.512595] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2370.540085] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 03:50:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x357, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:50:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010010000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010400000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:57 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x0, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) readv(r1, &(0x7f00000006c0)=[{&(0x7f0000001940)=""/4096, 0x1000}], 0x1) write$UHID_CREATE(r1, &(0x7f00000002c0)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000140)=""/7, 0x7}, 0x120) r2 = dup2(r0, r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r7, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r7, 0xae80, 0x0) r8 = signalfd(r7, &(0x7f0000000000)={0x3}, 0x8) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) r12 = ioctl$KVM_CREATE_VCPU(r11, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r12, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r12, 0xae80, 0x0) poll(&(0x7f0000000040)=[{r4, 0x100}, {r0, 0x10a8}, {r8, 0x200}, {r2, 0x2}, {r9, 0x1}, {r12, 0x41a6}, {0xffffffffffffffff, 0x80}, {r1, 0x1128}], 0x8, 0x101) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r3, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = fcntl$dupfd(r13, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) 03:50:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e090600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2370.849817] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2370.898554] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2370.919848] audit: type=1400 audit(2000001057.470:204): avc: denied { create } for pid=25035 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2370.985100] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2371.068281] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2371.133738] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2371.194979] audit: type=1400 audit(2000001057.750:205): avc: denied { create } for pid=25035 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2371.234484] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2371.269289] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2371.349278] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz0] on syz0 [ 2371.361393] audit: type=1400 audit(2000001057.780:206): avc: denied { create } for pid=25051 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2371.532134] audit: type=1400 audit(2000001057.780:207): avc: denied { create } for pid=25044 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2371.634210] audit: type=1400 audit(2000001057.790:208): avc: denied { write } for pid=25035 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:50:58 executing program 3: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./fi\x00\x000,lowerdir=.:file0,workdir=./file1']) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[]) [ 2371.758122] audit: type=1400 audit(2000001057.800:209): avc: denied { map } for pid=25037 comm="syz-executor.3" path=2F726F6F742F73797A6B616C6C65722D746573746469723030313734303634352F73797A6B616C6C65722E4433763973672F343331302F7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16595 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 2371.887445] audit: type=1400 audit(2000001057.810:210): avc: denied { write } for pid=25044 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2371.941951] audit: type=1400 audit(2000001057.810:211): avc: denied { ioctl } for pid=25051 comm="syz-executor.5" path="socket:[508995]" dev="sockfs" ino=508995 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2371.979323] audit: type=1400 audit(2000001057.830:212): avc: denied { write } for pid=25051 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2372.014424] audit: type=1400 audit(2000001057.840:214): avc: denied { map } for pid=25048 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2372.451791] overlayfs: missing 'lowerdir' [ 2372.461382] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2372.483733] overlayfs: missing 'lowerdir' [ 2372.515572] overlayfs: missing 'lowerdir' [ 2372.521769] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2372.536511] overlayfs: missing 'lowerdir' 03:50:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x358, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2372.555872] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2372.564439] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:50:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @remote}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x6}, 0x8) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x2) setsockopt$inet_udp_int(r1, 0x11, 0x1c, &(0x7f0000000080)=0x6, 0x4) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0), 0x4) 03:50:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010500000153b4", 0x33fe0}], 0x1}, 0x0) [ 2372.606830] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 03:50:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2000022e}], 0x1}, 0x0) 03:50:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0a0600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:50:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010060000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f00000000c0)) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) geteuid() r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@loccookie='loccookie'}, {@nodiscard='nodiscard'}, {@statfs_percent={'statfs_percent', 0x3d, 0x3}}, {@data_writeback='data=writeback'}, {@quota_account='quota=account'}], [{@euid_lt={'euid<', r6}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@appraise_type='app\x06\x00\x00\x00\x00\x00\x00\x00\x9d\f=imesig'}, {@euid_lt={'euid<', r6}}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 03:51:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010600000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x7ffff000}], 0x1}, 0x0) [ 2374.225761] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2374.714016] validate_nla: 4 callbacks suppressed [ 2374.714025] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2374.855960] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0b0600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000100f0000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010700000153b4", 0x33fe0}], 0x1}, 0x0) [ 2376.038300] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2376.057002] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2376.071204] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:51:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x359, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000040)=0x7fff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000080000009c0000000000000095f9ffffff100000"], &(0x7f0000e6bffc)='GPL\xfb', 0x1, 0x99, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000180), 0x10}, 0x46) 03:51:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000050153b4", 0x33fe0}], 0x1}, 0x0) [ 2376.084484] kauditd_printk_skb: 148 callbacks suppressed [ 2376.101524] audit: type=1400 audit(2000001062.640:362): avc: denied { create } for pid=25508 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2376.112294] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0xfffffdef}], 0x1}, 0x0) 03:51:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0e0600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2376.241651] audit: type=1400 audit(2000001062.760:363): avc: denied { create } for pid=25614 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010800000153b4", 0x33fe0}], 0x1}, 0x0) [ 2376.302759] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7069be53c2f3773940850515370ba6c2a6a69e0d53b79b22faf38f26dadaeb2d058f41c3e42354675c4cdd4a105cad0977d95f46866c2a4325494b3cc9264a1449810924eccbabfe6bb8e0f69277ac62c2fdf4e5cb6ba69a3a5edf4d27945f70cd7a505718040000000000000002f601f9751ff2730c1f594dcb45019d41ca089936dde84ec3972620780df34b90284ff3509f21db"], 0x0) dup(r1) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000002, 0x10, r0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f0000000100)) [ 2376.396928] audit: type=1400 audit(2000001062.790:364): avc: denied { create } for pid=25623 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000060153b4", 0x33fe0}], 0x1}, 0x0) [ 2376.542688] audit: type=1400 audit(2000001062.800:365): avc: denied { ioctl } for pid=25623 comm="syz-executor.5" path="socket:[508303]" dev="sockfs" ino=508303 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2376.774242] audit: type=1400 audit(2000001062.850:366): avc: denied { create } for pid=25624 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2376.901997] audit: type=1400 audit(2000001062.850:367): avc: denied { write } for pid=25623 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2377.106513] audit: type=1400 audit(2000001062.850:369): avc: denied { write } for pid=25624 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0f0600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x2}, 0x0) [ 2377.250651] audit: type=1400 audit(2000001062.850:368): avc: denied { prog_load } for pid=25622 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2377.403571] audit: type=1400 audit(2000001062.920:370): avc: denied { create } for pid=25623 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2377.521225] audit: type=1400 audit(2000001062.970:371): avc: denied { create } for pid=25624 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2378.025907] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2378.057960] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2378.078119] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010900000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000090153b4", 0x33fe0}], 0x1}, 0x0) [ 2379.300607] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2379.315344] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x35a, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x3}, 0x0) 03:51:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="9cd5f04e8eb27dd741c8180beddd2ffa14d27db6579b957e8b308861cec872ba0c714fd0f66e0b57489f5f1297f4a7913ef56f80b6183d114a47a82f9cc180b536ca58990ff7509564adc85d487cf8d27d65f58aed1ec8555c4c50b8729b2b40b6a8ccd7d2a5f5fabd9cec2a648333b38c8704acb16fb6a94ac308f029460a8a0f143f87dee9002572478da11fbe2757a7eddb2cdf28ad21c43e2a413edbb63fb5d7b69a66244fca2caa0cebf14212286e8d82b24e09cb961acd0511af00"], 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x36, "1c8662892176bf88c08c0a0e7d2873a0f1f37fc686b54499d9caa25abdba8664d4d6eec19a21920cbef4cf6ab8fe0f922476e427aefc"}, &(0x7f0000000200)=0x3e) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000280)={r4, 0x7, 0xb6, "1802d2504deede8abd136a96de25cde1e11671dbaa1d027bdf13ad6f09ed23b671ea49ce2100d0e1e92a3150acf6a19adf0a5eddbd661cf4e654d1681a47feba74259dfaf8d128476191078728847edae55fc3730ed2674d5934d1e62ed25c18d47046561230419bd491623e1eac89f883532d17ed46c4df05ee7a047a6d630a32f74728a3dbf7f4dfa852ca5bd913ebb5da06b619a47a3803802118b96bf489a31d69cc75c7a57e0eb2b743bcfbd486dbe8d90e30ec"}, 0xbe) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x02\x00', 0x67b59f38b29497d4}) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 2379.366114] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2379.391283] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e100600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2379.451422] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000100000a0153b4", 0x33fe0}], 0x1}, 0x0) [ 2379.552331] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:51:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010a00000153b4", 0x33fe0}], 0x1}, 0x0) [ 2379.627054] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:06 executing program 3: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = getpid() sched_setscheduler(0x0, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x400644, 0x0) setpgid(0x0, r0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @timestamp, @sack_perm, @timestamp], 0x5) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8051, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200000, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000240)) unshare(0x40000000) [ 2380.068799] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2380.155811] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e480600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x5}, 0x0) [ 2380.723693] IPVS: ftp: loaded support on port[0] = 21 [ 2381.219977] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2381.364407] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2381.658887] kauditd_printk_skb: 148 callbacks suppressed [ 2381.658900] audit: type=1400 audit(2000001068.220:520): avc: denied { create } for pid=26101 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010b00000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x8}, 0x0) [ 2381.790894] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:08 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x3c4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) close(r2) r3 = socket$inet6(0xa, 0x2000000000801, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x240}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="00032cbd70c1b4dbdf25030000000800800000000000"], 0x1c}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet(0x2, 0x99ca6b368dc3fe55, 0x20) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmmsg$alg(r7, 0x0, 0xfffffffffffffe19, 0x16040007) socket$inet_udp(0x2, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x33, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r3, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r9 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'\x00yz', 0x2}, &(0x7f00000002c0)="d277c7e573737e7d6e339a75c8b631a7e0c09e9658993ecdc1bdcff567e1b674ce92ce8ca0a84a8d51066ae66fafdd5dbc2ece302a8b39be96c9a0ef1bd23028f25d0df6eec2ca00d97eed296b6b922c997ce47d3f24d88c0dade48654a2332b5df7b4ff2e9b783225f91046182fbdb388e22c548cdbc14667e31e8e04a7ebdf0487c72ac9064b073b6baa497cbc428bd98cafcaf23a7e2ca6263c040ef1c2ba133a59b80f2f38ab7f2d7d9665e23424ca89a82dbfb8b307fbe9f935b00cebcb36f94dc7ee0e", 0xc6, 0xfffffffffffffffe) keyctl$search(0xa, r9, &(0x7f0000000240)='logon\x00', &(0x7f00000003c0)={'syz', 0x3}, 0xfffffffffffffffa) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 2381.820519] audit: type=1400 audit(2000001068.380:521): avc: denied { create } for pid=26101 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2382.127192] audit: type=1400 audit(2000001068.690:522): avc: denied { map } for pid=26309 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2382.242148] audit: type=1400 audit(2000001068.700:523): avc: denied { map } for pid=26309 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2382.393262] audit: type=1400 audit(2000001068.730:524): avc: denied { map } for pid=26309 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2382.493092] audit: type=1400 audit(2000001068.750:525): avc: denied { map } for pid=26309 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2382.578250] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=26353 comm=syz-executor.3 [ 2382.646517] audit: type=1400 audit(2000001068.810:526): avc: denied { map } for pid=26309 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2382.763351] audit: type=1400 audit(2000001068.850:527): avc: denied { map } for pid=26309 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2382.799235] audit: type=1400 audit(2000001068.860:528): avc: denied { create } for pid=26310 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2382.849141] audit: type=1400 audit(2000001068.860:529): avc: denied { map } for pid=26309 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2383.068425] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2383.088172] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x35b, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e4c0600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000100000b0153b4", 0x33fe0}], 0x1}, 0x0) 03:51:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0xa}, 0x0) 03:51:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000000)='\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/sequencer\x00', 0x0, 0x0) sendto$netrom(r0, &(0x7f0000001a40)="948b1031f7c9d63a6cdf73090fc98f0bb487a40fb6cfe23fa4daaf54e7a6767f8b6b29217cdf5674d46bf9b70ebbcadc162cec9b7f1697870042490566ad8d65d666de0f37452a3465b0d8a94756297e2ded702943", 0x55, 0x1a0d41e3dada199, &(0x7f0000001b00)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x200}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f00000005c0)={{0x3, 0x6, 0x3, 0x7, 'syz0\x00', 0x7f}, 0x4, 0x200, 0x2, 0x0, 0x8, 0x6, 'syz1\x00', &(0x7f0000000380)=['\x00', '\xdbkeyring\x00', '\v]\x00', '\x00', 'system,\x00', '^&vmnet0vmnet0eth1eth0em0\x00', 'proc:+@\x00', '\x00'], 0x39, [], [0x401, 0x6]}) 03:51:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010e00000153b4", 0x33fe0}], 0x1}, 0x0) [ 2383.300092] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2383.318375] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2383.415580] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e600600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000100000e0153b4", 0x33fe0}], 0x1}, 0x0) 03:51:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x25}, 0x0) 03:51:11 executing program 3: socket$inet6(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r0, &(0x7f0000003080)=[{{&(0x7f00000001c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}, 0x4}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000000200)="cd3fd046575796f57842297d5b5134e0dda0cfb9bdb226a3240ab1e1493994b608017a564be1c0bb37200239999d07f679d306f7db7df9c7eb0d1d069ccb8c1c71e02f74", 0x44}], 0x2, &(0x7f00000002c0)=[@hopopts_2292={{0x40, 0x29, 0x36, {0x29, 0x4, [], [@calipso={0x7, 0x20, {0x0, 0x6, 0x1, 0x1, [0x40, 0x1e1, 0x0]}}]}}}], 0x40}}, {{&(0x7f0000000300)={0xa, 0x4e21, 0x20, @loopback, 0x1f}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000340)="8fd94ac18890f3db707688c8769cf2ab80a1264391202184ae6ef4554025", 0x1e}, {&(0x7f0000000380)="abe6db22b144ae5c6caf90315a7e3c50f3938515ba1812407d8c96031067abbcd36868738415bb274fe02c2583aadb0e4fccef6ecdf077ae6d2a78266b40b48bc14c06e015d136a223be2536b2c4ceb547e5f0c049881dbf4a0559fe7fafa90534", 0x61}, {&(0x7f0000001780)="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", 0x1000}, {&(0x7f0000000400)="667dfe2b92b42693cc9a3df63a8c1d3f91da1d2a39144931b4e51655d8a91fb41a0ca93231c30befd032762a8e31c889ef83d7c55faae452a2ca63beab1a00bd2a4a9c298292791b9bc32c54f4f01e76a24c5b7a2be7ad8b8577aacf456cc8c1f361cdb18989449522c21fc5389d1139edb61acb2d05dbc52f1440157ff66e97310e50d7e4ea1e53c3ac8c82c615660614766a91db4c8992082549d25abbdc160899357736827f6246bf96a85aadd423d29e01a486", 0xb5}], 0x4, &(0x7f0000000500)=[@tclass={{0x14, 0x29, 0x43, 0xdc85}}, @dstopts_2292={{0x60, 0x29, 0x4, {0xc5, 0x8, [], [@hao={0xc9, 0x10, @mcast2}, @generic={0x2, 0x2a, "478d3dc1e8050e6c9cd4e5f9b7f6f11d9427efc34e2a2cb6fb7101c2a92eaa2ad21497678e2d011822da"}, @enc_lim={0x4, 0x1, 0x20}, @enc_lim={0x4, 0x1, 0x8a}]}}}, @hopopts={{0x48, 0x29, 0x36, {0x0, 0x5, [], [@enc_lim, @pad1, @hao={0xc9, 0x10, @empty}, @hao={0xc9, 0x10, @mcast1}]}}}], 0xc0}}, {{&(0x7f0000000600)={0xa, 0x4e21, 0x55, @dev={0xfe, 0x80, [], 0x17}, 0x10001}, 0x1c, &(0x7f0000002a00)=[{&(0x7f0000000640)="182740c04270c698393479b971f3b8b632141567997683d3e0701a3b21c65e869c186fb3e51e0b6d33f1b6ef7a88b83a137b9f866e23695bb5e831db39b099cdb062a638880c2b427351a344e593c24b6a9b85b535f43736f952ba6cfef5754e785d0f95be0b8371b0ba7dabd72d7cc8b7580a560ecd6ccf67cb6ae919be6da41854cf04c389257dae4fda3dc4dca7e9b416888f", 0x94}, {&(0x7f0000002780)="6378beb5b469a03979e01deb127a51277158d7a8d625e31079076e5381c480f3fe6bd7e9324069d35b45a7004b92de55c4d875649fd969cc0ec6865767f3e0ee67070c78", 0x44}, {&(0x7f0000002800)="cf563e0d9e3fa9c38910824a08151053a589c6d45ca69f371e7b388ed207b95b86b6dc4b1a7a81434d8ed61412a269b8e1ae31d94827502a87ddda3119795911c0d56c999114922c2ba967ad0b58325c527bc52df38dde1f33549fe7d7cc455231d8ef2d8849b8a0e7744a851aa706c8e161569fe67efee8b71095151c060390aec20994e621deb887b1519416e7c0f2e593c41aaa6b0fe9f330fd3632287b1d9a4489aab9d8079757b0648a8e8aaf515b7fdd050beacff08e0143dd641a5243d31681e625d866090062b73b6a413630b69f7ff49456a3569eb00361fdf1a97f9eec90100788f8fb037261b1", 0xec}, {&(0x7f0000002900)="9a17a87e184502ef18034e103284579c5195e2b5b26391840d2656bf4597a3a856771b0e3dee3366b1eed19ebf0bf01b1fbf415daccd139d9055b2a228512032e6128228dd0ec3a82b6d20a36e7ca0cf6bd004896192703f5e4a515cbea997628f13db9faae85a483bde65b74692c1a181bc3352c87ecbaeccd6dfb4bdacd0fcacbcf2a170aa2e534a4bbd7bdc613a18545df989975f28eec480f0440fce8dfabb47e0d61efc8098628b67216ccf38ad1e7882ac34ce8f8a1b562622b425adb13457adc0293128fb71f20c989566c83b481f0ce2843e94f7fb3302", 0xdb}, {&(0x7f0000000700)="49ad158e3db2079c5acd9d3ff9b571a76836ab7e2efc8f89526126c84f6b810cd51f", 0x22}], 0x5, &(0x7f0000002a80)=[@rthdr={{0x98, 0x29, 0x39, {0x84, 0x10, 0x0, 0x2, 0x0, [@rand_addr="3d4187a7c8709e1474f90144e1d05839", @rand_addr="8e2246a8469631d32b99c7b0b02d9293", @local, @loopback, @ipv4={[], [], @broadcast}, @local, @dev={0xfe, 0x80, [], 0x1b}, @mcast1]}}}], 0x98}}, {{&(0x7f0000002b40)={0xa, 0x4e21, 0x80000001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}, 0x1c, &(0x7f0000002e40)=[{&(0x7f0000002b80)="5ba214460a8207ae6e1d02cc470f6e87c5662c8362993ebbea2c72a1d922d18d7ecbf2f9028ed3d1bfb05376a25a225e88279eba90b37a68338eacc40bf2152dc4029400993eaf9fc1adafbd6ff50df9806b00e30c47db4873eac9e3e53d91b33d6d901caa75acc8033c7caf0bc9176eed25da5cd797d298287b12544e908dcb58675b1c3f4249a6fa993b5456c6859eaa87f2b969d100ff726eacad152ff5cc564b019ac81c350839ecf91a16d98e0105c28b075abd311e15a790a72b28da", 0xbf}, {&(0x7f0000002c40)="31fa804f4dcd50f3bf233f26a7a6383fb0711829d8b838258d9702f172200c362ca2aec1706f2b18b9a54c0079195f", 0x2f}, {&(0x7f0000002c80)="7e2f49ee724d9377848597f577b7c8fc4df48fd77150430ca3eb20bbaf77c1d488682ed5c20cae577fea37c0a7f74c3e058a764d7f9357e0c17c904e2d4e36c3fe8bef6542fe0f9dc7fe19ccf5eab7b295305d63c37bca8a29c238a7ee65835033ec072e6b7079869c24b3b9c97d17bcd6aeb78677c63515a06119f3ed55c1ed16330d0cf1f101fd9f50d8e6fbe7e0213daeb6ce18c1dd9dbc70fc5d030686", 0x9f}, {&(0x7f0000002d40)="77173684b4927b787aab4b5bbc496729fb31276edf9fb9aec45b94919320a6aba1739c31e72c1c68bfb14bb3d719450cc4cd79e345d0a0e19981e8eddbaf287ddfd61fb21a8772aba7b47b5765f8c65ec33ecd8f8a580240bd0ecf4b7f6bd2ac108c78b72d4f56eaebe96193eee3ea776c8b751916041699fa90f6bc98985487eede40f6de66534c31b7ec82a25a9b38185c67569c3e180877925132fd8f962fb49fee2192482656849ea337eab15a896cb8ec932dd4ef24d2283e791c9d047e6e47f5e14d16ebd882944903ac8ed33b9b754c6d3dc1950bab7820f6017a55146aa2b2e9670e3772ef98bf", 0xeb}], 0x4, &(0x7f0000002e80)=[@hopopts_2292={{0x30, 0x29, 0x36, {0xd, 0x3, [], [@pad1, @hao={0xc9, 0x10, @loopback}, @pad1]}}}, @rthdr={{0xa8, 0x29, 0x39, {0xb681f25cf4f3e35e, 0x12, 0x2, 0x7f, 0x0, [@mcast2, @local, @rand_addr="72fa164b3ec89142726e1cf151c5dc4b", @ipv4={[], [], @local}, @rand_addr="74a4af19e0f3f534d7add6250fafb117", @loopback, @remote, @rand_addr="2eacf2e944091af27223da705b06704d", @empty]}}}, @dstopts_2292={{0xf8, 0x29, 0x4, {0x2c, 0x1b, [], [@calipso={0x7, 0x58, {0x80000001, 0x14, 0x20, 0x0, [0x1, 0x7, 0x81, 0x9, 0xfffffffffffffc00, 0x3, 0x9, 0xcfa, 0xf, 0x9]}}, @calipso={0x7, 0x48, {0x8000, 0x10, 0x7f, 0x37, [0xe5, 0x8, 0x988f, 0x100000000, 0x9, 0x4, 0x7fff, 0x0]}}, @calipso={0x7, 0x38, {0x1ff, 0xc, 0x3, 0x7fff, [0x400, 0x8, 0x5, 0x800, 0xfffffffffffffffa, 0x8]}}]}}}], 0x1d0}}], 0x4, 0x0) [ 2385.218238] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2385.271335] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x52}, 0x0) [ 2385.415863] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2385.423277] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010f00000153b4", 0x33fe0}], 0x1}, 0x0) [ 2385.838072] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2386.966199] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2386.984224] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x35c, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:13 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000003c0)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000340)) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) pipe(0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @mcast1, @local, 0x0, 0x0, 0x0, 0x100}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./file0\x00') creat(0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000080), 0x4000) r2 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x0) sendfile(r2, r3, &(0x7f0000d83ff8), 0x0) 03:51:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e680600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000100000f0153b4", 0x33fe0}], 0x1}, 0x0) 03:51:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x5d}, 0x0) [ 2387.154692] kauditd_printk_skb: 134 callbacks suppressed [ 2387.154706] audit: type=1400 audit(2000001073.670:664): avc: denied { create } for pid=26761 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000011000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2387.466324] audit: type=1400 audit(2000001074.030:665): avc: denied { create } for pid=26864 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e00060000000001007e210153b4", 0x33fe0}], 0x1}, 0x0) [ 2387.594881] audit: type=1400 audit(2000001074.030:666): avc: denied { create } for pid=26865 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2387.635005] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2387.673103] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2387.737305] audit: type=1400 audit(2000001074.060:667): avc: denied { create } for pid=26864 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e6c0600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2387.917997] audit: type=1400 audit(2000001074.130:668): avc: denied { create } for pid=26866 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x62}, 0x0) [ 2388.071658] syz-executor.2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 2388.078235] audit: type=1400 audit(2000001074.140:669): avc: denied { write } for pid=26866 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2388.178123] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 2388.244741] CPU: 1 PID: 26955 Comm: syz-executor.2 Not tainted 4.19.81 #0 [ 2388.251890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2388.261287] Call Trace: [ 2388.264023] dump_stack+0x172/0x1f0 [ 2388.267671] dump_header+0x15e/0xa55 [ 2388.271430] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2388.276643] ? ___ratelimit+0x60/0x595 [ 2388.277933] audit: type=1400 audit(2000001074.290:670): avc: denied { map } for pid=26920 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2388.280554] ? do_raw_spin_unlock+0x57/0x270 [ 2388.280572] oom_kill_process.cold+0x10/0x6ef [ 2388.311550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2388.317366] ? task_will_free_mem+0x139/0x6e0 [ 2388.321892] out_of_memory+0x362/0x1330 [ 2388.325896] ? lock_downgrade+0x880/0x880 [ 2388.330058] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2388.335172] ? oom_killer_disable+0x280/0x280 [ 2388.339686] ? find_held_lock+0x35/0x130 [ 2388.343780] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2388.348648] ? memcg_event_wake+0x230/0x230 [ 2388.354044] ? do_raw_spin_unlock+0x57/0x270 [ 2388.358739] ? _raw_spin_unlock+0x2d/0x50 [ 2388.363080] try_charge+0xef7/0x1480 [ 2388.366893] ? percpu_ref_tryget_live+0xef/0x290 [ 2388.371667] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2388.376603] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2388.381490] ? find_held_lock+0x35/0x130 [ 2388.383652] audit: type=1400 audit(2000001074.300:671): avc: denied { map } for pid=26920 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2388.385562] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2388.385585] memcg_kmem_charge_memcg+0x83/0x170 [ 2388.385600] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2388.385621] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2388.427706] memcg_kmem_charge+0x136/0x370 [ 2388.431966] __alloc_pages_nodemask+0x3c3/0x750 [ 2388.436658] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2388.441693] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2388.446290] ? trace_hardirqs_on+0x67/0x220 [ 2388.450617] ? kasan_check_read+0x11/0x20 [ 2388.454779] copy_process.part.0+0x3e0/0x7a30 [ 2388.459378] ? lock_downgrade+0x880/0x880 [ 2388.463542] ? migration_entry_to_page+0x320/0x320 [ 2388.468478] ? lru_cache_add+0x21c/0x590 [ 2388.472553] ? kasan_check_read+0x11/0x20 [ 2388.475720] audit: type=1400 audit(2000001074.330:672): avc: denied { map } for pid=26920 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2388.477139] ? do_raw_spin_unlock+0x57/0x270 [ 2388.477156] ? _raw_spin_unlock+0x2d/0x50 [ 2388.510650] ? __cleanup_sighand+0x70/0x70 [ 2388.515141] ? __do_page_fault+0x676/0xe90 [ 2388.519398] ? find_held_lock+0x35/0x130 [ 2388.523480] ? __do_page_fault+0x676/0xe90 [ 2388.527750] _do_fork+0x257/0xfd0 [ 2388.531237] ? fork_idle+0x1d0/0x1d0 [ 2388.534980] ? up_read+0x1a/0x110 [ 2388.538443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2388.544087] ? __do_page_fault+0x484/0xe90 [ 2388.548439] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2388.553305] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2388.558085] ? do_syscall_64+0x26/0x620 [ 2388.562082] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2388.567459] ? do_syscall_64+0x26/0x620 [ 2388.571446] __x64_sys_clone+0xbf/0x150 [ 2388.575445] do_syscall_64+0xfd/0x620 [ 2388.579362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2388.583129] audit: type=1400 audit(2000001074.330:673): avc: denied { map } for pid=26920 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2388.584551] RIP: 0033:0x45c919 [ 2388.584566] Code: ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8c fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 2388.584573] RSP: 002b:00007ffd22df9578 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 2388.584586] RAX: ffffffffffffffda RBX: 00007ff94d026700 RCX: 000000000045c919 [ 2388.584595] RDX: 00007ff94d0269d0 RSI: 00007ff94d025db0 RDI: 00000000003d0f00 [ 2388.584603] RBP: 00007ffd22df9790 R08: 00007ff94d026700 R09: 00007ff94d026700 [ 2388.584610] R10: 00007ff94d0269d0 R11: 0000000000000202 R12: 0000000000000000 [ 2388.584617] R13: 00007ffd22df962f R14: 00007ff94d0269c0 R15: 000000000075bfd4 03:51:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000100003f0153b4", 0x33fe0}], 0x1}, 0x0) 03:51:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE(r1, 0x4008ae6a, &(0x7f0000000000)) [ 2389.196996] Task in /syz2 killed as a result of limit of /syz2 03:51:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000014800000153b4", 0x33fe0}], 0x1}, 0x0) [ 2389.277169] memory: usage 307164kB, limit 307200kB, failcnt 4185 [ 2389.321392] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2389.466972] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2389.526810] Memory cgroup stats for /syz2: cache:0KB rss:159552KB rss_huge:135168KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:159572KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2389.660212] Memory cgroup out of memory: Kill process 11640 (syz-executor.2) score 1113 or sacrifice child [ 2389.720225] Killed process 11640 (syz-executor.2) total-vm:72720kB, anon-rss:2216kB, file-rss:35800kB, shmem-rss:0kB [ 2389.996028] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2391.326529] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:51:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x35d, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x64}, 0x0) 03:51:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e740600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000400153b4", 0x33fe0}], 0x1}, 0x0) 03:51:17 executing program 3: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000001c0)=@req3, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x1ff}, &(0x7f0000000200), 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=0x1, 0x4) [ 2391.458028] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000014c00000153b4", 0x33fe0}], 0x1}, 0x0) [ 2391.942098] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2391.976879] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2391.996500] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000600153b4", 0x33fe0}], 0x1}, 0x0) 03:51:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e7a0600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2392.190484] kauditd_printk_skb: 108 callbacks suppressed [ 2392.190498] audit: type=1400 audit(2000001078.750:782): avc: denied { map } for pid=27322 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:51:18 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) fcntl$setstatus(r2, 0x4, 0x46600) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) io_submit(r1, 0x2c, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000800)='7', 0x20000801}]) 03:51:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x7e}, 0x0) [ 2392.364591] audit: type=1400 audit(2000001078.750:783): avc: denied { map } for pid=27322 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2392.434628] audit: type=1400 audit(2000001078.820:784): avc: denied { create } for pid=27362 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2392.604641] audit: type=1400 audit(2000001078.830:785): avc: denied { write } for pid=27362 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2392.764368] audit: type=1400 audit(2000001079.070:786): avc: denied { map } for pid=27431 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2392.898512] audit: type=1400 audit(2000001079.070:787): avc: denied { map } for pid=27431 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2393.020237] audit: type=1400 audit(2000001079.070:788): avc: denied { map } for pid=27431 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2393.160463] audit: type=1400 audit(2000001079.070:789): avc: denied { map } for pid=27431 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2393.273418] audit: type=1400 audit(2000001079.150:790): avc: denied { map } for pid=27431 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2393.370974] audit: type=1400 audit(2000001079.240:791): avc: denied { map } for pid=27431 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:51:20 executing program 3: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x10) writev(r0, &(0x7f0000000100)=[{0x0}], 0x1) [ 2393.582577] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:51:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x10d}, 0x0) [ 2393.624498] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2394.485674] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2394.493181] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2394.518469] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x35e, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000016000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:21 executing program 3: 03:51:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x300}, 0x0) 03:51:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000100217e0153b4", 0x33fe0}], 0x1}, 0x0) 03:51:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000900000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:21 executing program 3: [ 2395.366537] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2395.416706] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000016800000153b4", 0x33fe0}], 0x1}, 0x0) [ 2395.734919] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000f00153b4", 0x33fe0}], 0x1}, 0x0) 03:51:22 executing program 3: 03:51:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x38e}, 0x0) 03:51:23 executing program 3: [ 2396.645197] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2396.652641] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 2396.692920] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2396.723657] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2396.773876] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2397.466191] kauditd_printk_skb: 121 callbacks suppressed [ 2397.466206] audit: type=1400 audit(2000001083.440:913): avc: denied { create } for pid=27880 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2397.572934] audit: type=1400 audit(2000001083.450:914): avc: denied { create } for pid=27882 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2397.692260] audit: type=1400 audit(2000001084.090:915): avc: denied { map } for pid=27891 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2397.756398] audit: type=1400 audit(2000001084.090:916): avc: denied { map } for pid=27891 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2397.790211] audit: type=1400 audit(2000001084.110:917): avc: denied { map } for pid=27891 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2397.819226] audit: type=1400 audit(2000001084.110:918): avc: denied { map } for pid=27891 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2397.855117] audit: type=1400 audit(2000001084.160:919): avc: denied { map } for pid=27893 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2397.984803] audit: type=1400 audit(2000001084.160:920): avc: denied { map } for pid=27893 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2398.049944] audit: type=1400 audit(2000001084.180:921): avc: denied { map } for pid=27893 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2398.112706] audit: type=1400 audit(2000001084.200:922): avc: denied { map } for pid=27893 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:51:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x35f, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000016c00000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000a00000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000030053b4", 0x33fe0}], 0x1}, 0x0) 03:51:24 executing program 3: 03:51:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x3d8}, 0x0) 03:51:25 executing program 3: [ 2398.462801] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2398.491312] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2398.546212] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2398.576061] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000040053b4", 0x33fe0}], 0x1}, 0x0) [ 2398.629533] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:51:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e010d00000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000017400000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0xfe3}, 0x0) 03:51:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = socket$inet6(0xa, 0x80001, 0x0) r2 = getpid() setpgid(r2, 0x0) rt_tgsigqueueinfo(0x0, r2, 0x1, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='mountstats\x00') ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000006218d038f25f2158f6efee65d56d570b"]) ioctl$sock_FIOGETOWN(r3, 0x8903, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000003c0)={@empty, 0x5a}) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, 0x0, 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) sendfile(r0, r0, 0x0, 0x24000058) getpgid(0xffffffffffffffff) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000005500080000000000000000400000", 0x20, 0x1c0}]) [ 2400.269034] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2400.292497] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2400.346066] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2400.361281] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2400.774986] Dev loop3: unable to read RDB block 1 [ 2400.814755] loop3: unable to read partition table [ 2400.819917] loop3: partition table beyond EOD, truncated [ 2400.842411] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 2401.231348] Dev loop3: unable to read RDB block 1 [ 2401.247644] loop3: unable to read partition table [ 2401.256689] loop3: partition table beyond EOD, truncated [ 2401.262204] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 03:51:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x360, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e001a00000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:28 executing program 3: r0 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740)="ad", 0x1, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$search(0xa, r0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x3}, 0xfffffffffffffffa) 03:51:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000020153b4", 0x33fe0}], 0x1}, 0x0) 03:51:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0xfeb}, 0x0) 03:51:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000017a00000153b4", 0x33fe0}], 0x1}, 0x0) [ 2401.956203] validate_nla: 1 callbacks suppressed [ 2401.956214] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2402.082884] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2402.151963] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2402.196164] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2402.219684] netlink: 'syz-executor.0': attribute type 26 has an invalid length. 03:51:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000040153b4", 0x33fe0}], 0x1}, 0x0) 03:51:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001f000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e002000000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$cec(0x0, 0x2, 0x2) dup3(0xffffffffffffffff, r1, 0x0) write$selinux_load(r1, &(0x7f0000001200)=ANY=[@ANYBLOB="8cff7cf90800000053080000006e7578698395d771139ef4c3e8ef91c5a51234e3735d3ba7eb5493d341776f26f22b673fe17a770b66f5e2a987de0a1b71da0fb36fd7bf44657656c5be2a739dba75301dd8e37adb617cf8ba485765ae833e5b1579af6ed3802a8201da3be2f601a5c5b202e03711fb5d5d4e070046c58ae724aad79a4a7040fe98f3764c49dbd390a6c00a3d675fb286ad92872e28493a9200b8fa4c7ccc00"/194], 0xbb) getsockopt$inet_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000200)=""/4096, &(0x7f0000000080)=0x1000) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = gettid() ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000040)={[], 0x8, 0x158, 0x40, 0x81, 0x1, r6}) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) r8 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r9 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) r11 = gettid() ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000040)={[], 0x8, 0x158, 0x40, 0x81, 0x1, r11}) r12 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) r13 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r13, 0x0, 0x0) r14 = getpgrp(0x0) waitid(0x0, r14, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r14, 0x9, &(0x7f00000001c0)=""/68) r15 = getpgid(r14) r16 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r16, 0x8904, &(0x7f0000000000)=0x0) r18 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r19 = openat$cgroup_ro(r18, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r20 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r21 = inotify_init1(0x0) r22 = gettid() fcntl$setown(r21, 0x8, r22) r23 = getpid() r24 = socket(0xa, 0x3, 0x8) r25 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r24, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r25, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r24, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r27 = gettid() waitid(0x83b895581628fca4, r27, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r24, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r26, @ANYRESDEC=r27]], 0xfffffffffffffe56}}, 0x20004850) r28 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r29 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r30 = dup2(r29, r28) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r30, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r30, 0xc08c5334, &(0x7f0000000200)) r31 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r31) timer_create(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, @tid=r31}, 0x0) kcmp(r31, r31, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r31, 0x0, 0x0) r32 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r31, r32, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r33}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r27, r30, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r33}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r33}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r33}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r23, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r33}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r33}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r22, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='ppp0eth1]*em0\x00', r33}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r20, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r33}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r19, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r33}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r17, r16, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r33}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r15, r13, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r33}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r33}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r11, r12, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00', r33}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r33}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r6, r7, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00', r33}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000040)='GPLvmnet0\\]GPL&systemeth1\x00', r33}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00', r33}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r33}, 0xc) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) r34 = accept$alg(r0, 0x0, 0x0) r35 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r35, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r36 = syz_open_pts(r35, 0x0) ioctl$TIOCSETD(r36, 0x541d, 0x0) r37 = dup3(r36, r35, 0x0) fsetxattr$security_smack_entry(r36, &(0x7f0000000000)='security.SMACK64\x00', &(0x7f0000000040)='syzkaller0\x00', 0xb, 0x2) sendmmsg(r34, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) dup(r37) [ 2402.516173] kauditd_printk_skb: 172 callbacks suppressed [ 2402.516187] audit: type=1400 audit(2000001089.080:1095): avc: denied { map } for pid=28377 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2402.694625] audit: type=1400 audit(2000001089.110:1096): avc: denied { map } for pid=28377 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:51:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0xff3}, 0x0) [ 2402.855336] audit: type=1400 audit(2000001089.210:1097): avc: denied { map } for pid=28446 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2402.984811] audit: type=1400 audit(2000001089.220:1098): avc: denied { map } for pid=28446 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2403.084781] audit: type=1400 audit(2000001089.290:1099): avc: denied { map } for pid=28446 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2403.182524] audit: type=1400 audit(2000001089.290:1100): avc: denied { map } for pid=28446 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2403.282909] audit: type=1400 audit(2000001089.340:1101): avc: denied { map } for pid=28446 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2403.383898] audit: type=1400 audit(2000001089.390:1102): avc: denied { map } for pid=28446 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2403.491559] audit: type=1400 audit(2000001089.410:1103): avc: denied { map } for pid=28446 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2403.707979] audit: type=1400 audit(2000001089.480:1104): avc: denied { map } for pid=28446 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2404.165991] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000050153b4", 0x33fe0}], 0x1}, 0x0) [ 2404.387834] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2404.407218] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2404.449431] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2404.728856] bridge0: port 3(gretap0) entered blocking state [ 2404.787653] bridge0: port 3(gretap0) entered disabled state [ 2404.816249] device gretap0 entered promiscuous mode [ 2404.835263] bridge0: port 3(gretap0) entered blocking state [ 2404.841096] bridge0: port 3(gretap0) entered forwarding state 03:51:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x361, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2405.518348] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e003500000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x75cc7d59}, 0x0) 03:51:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010003000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:32 executing program 3: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1f, 0x0, &(0x7f00000001c0)) 03:51:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000060153b4", 0x33fe0}], 0x1}, 0x0) 03:51:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 2405.735692] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2405.757851] netlink: 'syz-executor.0': attribute type 53 has an invalid length. [ 2405.777152] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010005000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e004000000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x75cc7d5f}, 0x0) 03:51:33 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "88dc4f", 0x8, 0x88, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000000)={0x0, 0x4, [0x0, 0xceb]}) syz_emit_ethernet(0x287, &(0x7f0000000140)={@dev={[], 0x22}, @broadcast, [{[{0x9100, 0x2, 0x0, 0x1}], {0x8100, 0x0, 0x1, 0x3}}], {@mpls_uc={0x8847, {[{0xaeef, 0x0, 0x1}, {0x5, 0x0, 0x1}], @ipv6={0x7, 0x6, "7f0874", 0x241, 0x33, 0x2, @rand_addr="aa357cc6165e6eeb3e74b090a9274e12", @ipv4={[], [], @remote}, {[@hopopts={0x32, 0x11, [], [@calipso={0x7, 0x38, {0x11, 0xc, 0x0, 0x2, [0x2, 0x6, 0xfff, 0x2, 0x40, 0x4]}}, @hao={0xc9, 0x10, @local}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0xdb, 0x19, "92b043e83dc181a70e1b2f845f3ded5492221abb6d4711c472"}, @hao={0xc9, 0x10, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x16}}}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1]}, @srh={0x0, 0x4, 0x4, 0x2, 0x20, 0x0, 0x0, [@loopback, @mcast2]}, @srh={0xb96cd9fd00efe386, 0x0, 0x4, 0x0, 0x6, 0x10, 0xff}, @fragment={0x6c, 0x0, 0x1e, 0x0, 0x0, 0x1a, 0x66}, @hopopts={0x1d, 0x9, [], [@jumbo, @calipso={0x7, 0x20, {0x1e4, 0x6, 0x1f, 0x7, [0x8, 0x20, 0x2f5]}}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x18, {0x7fffffff, 0x4, 0x94, 0xffff, [0x9, 0x4d]}}]}, @fragment={0xf9, 0x0, 0x4, 0x1, 0x0, 0x7, 0x68}, @srh={0x3b, 0xc, 0x4, 0x6, 0x55, 0xa0, 0x8001, [@local, @empty, @remote, @mcast1, @loopback, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}], @dccp={{0x4e23, 0x4e24, 0x4, 0x1, 0x7, 0x0, 0x0, 0xd, 0x4, "9fcf39", 0x7f, "1d1965"}, "47d2929d3dea5c8ec75b238700522709c4cc2ad1b31349d540c8e5ed6680da4266b557d7489f42447f172756b807821c660550594ad16d407d3235e517efcf10e7ee33d94cc20732c895163eb3dd8c19e9570669c8e6570ff3ed5c4191a556bbe2b3dc601a217eaf16d6818fff2f9653fbc1daef935fc9e40c2d75945d400e5f4f736cecc2900313389229067b4cde415ec1a592d48a27d5bb"}}}}}}}, &(0x7f0000000040)={0x0, 0x1, [0xe99, 0xd98, 0x235, 0xf0f]}) [ 2407.229551] validate_nla: 3 callbacks suppressed [ 2407.229562] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2407.282688] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2407.345661] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000080153b4", 0x33fe0}], 0x1}, 0x0) [ 2407.405120] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2407.435865] netlink: 'syz-executor.0': attribute type 64 has an invalid length. [ 2407.528217] kauditd_printk_skb: 140 callbacks suppressed [ 2407.528231] audit: type=1400 audit(2000001094.090:1245): avc: denied { create } for pid=28813 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2407.727995] audit: type=1400 audit(2000001094.180:1246): avc: denied { create } for pid=28814 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2408.264794] audit: type=1400 audit(2000001094.820:1247): avc: denied { create } for pid=28926 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2408.388003] audit: type=1400 audit(2000001094.840:1248): avc: denied { write } for pid=28926 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2408.471032] audit: type=1400 audit(2000001094.890:1249): avc: denied { map } for pid=28929 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2408.506082] audit: type=1400 audit(2000001094.900:1250): avc: denied { map } for pid=28929 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2408.530788] audit: type=1400 audit(2000001094.900:1251): avc: denied { map } for pid=28929 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2408.556999] audit: type=1400 audit(2000001094.910:1252): avc: denied { map } for pid=28929 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2408.585951] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2408.615426] audit: type=1400 audit(2000001094.910:1253): avc: denied { map } for pid=28927 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2408.725977] audit: type=1400 audit(2000001094.910:1254): avc: denied { map } for pid=28927 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:51:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x362, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010006000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e005200000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0xffffff1f}, 0x0) 03:51:35 executing program 3: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x600080, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbff, 0x100000}, 0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) sched_setscheduler(0x0, 0x0, 0x0) setpgid(0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/load\x00', 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="b4a9e846aea1e2624685e2e527a6c3bd642f4fd847cb6d34363642a299297b0bf05a7dc00b2753dc2e84cfbf7ca8b12a93cad981db7d1adf6de9c207c89d2c9cfe8e4a670557dd76dd6e7449e4d0430596d777172ce71c91cf0451ec8499ee4bbac03e7f8af92ab27aba638253aaa1a154b759cf296d637e3677541293ab891b06706153a95a9f45bb6e13c6e1c971a27faf0a5f933d4935cd5680da7c4178b2b510afe9ebab63a04889ac90c8f3154f7271f61bfa3b2046166d7f8c63cd95298ae3558de27869f4d98f2eda893881dd5ca90927ab10c64058c7a54e773dc1e971a38f55fab8d1d58d81faecdc623ff395ac4b245ca5bc52fd587da254485c67") setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000280)={'gre0\x00', {0x2, 0x4e23, @loopback}}) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) unshare(0x40000000) 03:51:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000090153b4", 0x33fe0}], 0x1}, 0x0) [ 2409.442484] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2409.478291] netlink: 'syz-executor.0': attribute type 82 has an invalid length. [ 2409.498733] IPVS: ftp: loaded support on port[0] = 21 03:51:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e006400000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2409.630108] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010007000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x2}, 0x0) [ 2411.025842] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x3}, 0x0) [ 2411.086192] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:51:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000100000a0153b4", 0x33fe0}], 0x1}, 0x0) [ 2411.305012] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000900000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x363, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010009000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x4}, 0x0) [ 2412.294713] validate_nla: 1 callbacks suppressed [ 2412.294723] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000a00000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2412.560906] kauditd_printk_skb: 105 callbacks suppressed [ 2412.560921] audit: type=1400 audit(2000001099.120:1360): avc: denied { map } for pid=29481 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2412.789612] audit: type=1400 audit(2000001099.220:1361): avc: denied { map } for pid=29481 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2412.922010] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2412.929853] audit: type=1400 audit(2000001099.220:1362): avc: denied { map } for pid=29481 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2412.991096] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2413.055757] audit: type=1400 audit(2000001099.320:1363): avc: denied { map } for pid=29481 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2413.151484] audit: type=1400 audit(2000001099.320:1364): avc: denied { map } for pid=29481 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2413.177198] audit: type=1400 audit(2000001099.430:1365): avc: denied { map } for pid=29484 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2413.202086] audit: type=1400 audit(2000001099.450:1366): avc: denied { create } for pid=29482 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2413.233059] audit: type=1400 audit(2000001099.460:1367): avc: denied { create } for pid=29483 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2413.370453] audit: type=1400 audit(2000001099.460:1368): avc: denied { map } for pid=29484 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2413.509482] audit: type=1400 audit(2000001099.460:1369): avc: denied { map } for pid=29484 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2413.862928] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:51:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000a000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:42 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000240)=0x10) rt_tgsigqueueinfo(r0, r1, 0x16, &(0x7f0000000000)={0xf}) mount$overlay(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)='overlay\x00', 0x80400, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) mlockall(0x1) ptrace(0x10, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) shmget$private(0x0, 0x1000, 0x40, &(0x7f0000ffb000/0x1000)=nil) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_xfrm(r4, &(0x7f00000002c0)={&(0x7f0000000280), 0xc, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x2000a801}, 0x4000010) r5 = dup(r2) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x6) ioctl$VIDIOC_QUERYBUF(r5, 0xc0585609, &(0x7f0000000080)={0x80000001, 0x8, 0x4, 0x20000, {0x0, 0x7530}, {0x2, 0x8, 0x9, 0x2, 0x2, 0x21}, 0x3, 0x4, @planes=&(0x7f0000000380)={0x1, 0xdd32, @fd=r7, 0x81}, 0x3d5}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000100)="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") waitid(0x0, 0x0, &(0x7f0000001ff0), 0x5, 0x0) 03:51:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000100000b0153b4", 0x33fe0}], 0x1}, 0x0) 03:51:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x5}, 0x0) 03:51:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e001a00000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x364, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2416.407046] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2416.449820] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000b000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6}, 0x0) [ 2417.976701] kauditd_printk_skb: 90 callbacks suppressed [ 2417.976714] audit: type=1400 audit(2000001104.540:1460): avc: denied { create } for pid=29726 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2418.059452] audit: type=1400 audit(2000001104.550:1461): avc: denied { ioctl } for pid=29726 comm="syz-executor.5" path="socket:[511589]" dev="sockfs" ino=511589 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x7}, 0x0) [ 2418.093683] audit: type=1400 audit(2000001104.550:1462): avc: denied { create } for pid=29726 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2418.225994] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2418.233531] netlink: 'syz-executor.0': attribute type 26 has an invalid length. 03:51:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x365, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:44 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x25d) r0 = socket(0x11, 0xa, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x1c, &(0x7f0000000000), 0x20a154cc) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x319) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0xb9, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x2418a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2218c1, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000380)=[{{0x77359400}, 0x17, 0x1ff, 0x19b9}, {{}, 0x1f, 0x0, 0x78f}, {{0x0, 0x2710}, 0x12, 0xad, 0x9}, {{r2, r3/1000+10000}, 0x10, 0x3, 0x1}, {{0x77359400}, 0x16, 0x5, 0xffffffff}, {{}, 0x2, 0x7ff, 0x3d}], 0x90) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r4, r4, 0x0, 0x24000000) [ 2418.318586] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2418.344730] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:51:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e003500000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2418.439420] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000100000e0153b4", 0x33fe0}], 0x1}, 0x0) [ 2418.668215] audit: type=1400 audit(2000001105.230:1463): avc: denied { create } for pid=29919 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000e000153b4", 0x33fe0}], 0x1}, 0x0) [ 2418.809951] audit: type=1400 audit(2000001105.300:1464): avc: denied { map } for pid=29922 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2418.947001] audit: type=1400 audit(2000001105.350:1465): avc: denied { map } for pid=29922 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2419.092485] audit: type=1400 audit(2000001105.350:1466): avc: denied { map } for pid=29922 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:51:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e005200000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2419.301942] audit: type=1400 audit(2000001105.350:1467): avc: denied { map } for pid=29922 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2419.474064] audit: type=1400 audit(2000001105.390:1468): avc: denied { map } for pid=29922 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2419.638547] audit: type=1400 audit(2000001105.410:1469): avc: denied { map } for pid=29950 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:51:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x8}, 0x0) 03:51:46 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x208) connect$inet6(r1, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x303}, "1f88b228b5c500", "52a8f3c9edd18e459572f1c59d2a86e8f5088c6b3768c865c200", "b611dfba", "907291487b859891"}, 0x38) [ 2420.220348] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e0006000000000100000f0153b4", 0x33fe0}], 0x1}, 0x0) [ 2420.617727] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2420.717296] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x9}, 0x0) 03:51:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000080)={0x61, 0x5, 0x7, 0x20, 0x16, 0x1, 0x50, 0x3, 0x3ff, 0x40}) socket$inet6_sctp(0xa, 0x5, 0x84) mount$9p_tcp(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000040)={'trans=tcp,', {'port', 0x3d, 0xf6ffffff}}) 03:51:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000f000153b4", 0x33fe0}], 0x1}, 0x0) [ 2421.748402] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2421.782390] netlink: 'syz-executor.0': attribute type 82 has an invalid length. 03:51:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x366, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2421.840935] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e006400000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000100153b4", 0x33fe0}], 0x1}, 0x0) [ 2422.049672] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:51:48 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000002ec0), 0x4000000000009fc, 0x2, &(0x7f00000001c0)={0x77359400}) syz_mount_image$ntfs(&(0x7f0000004680)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\b']) [ 2422.201691] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xa}, 0x0) 03:51:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010020000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000d01000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2422.995501] kauditd_printk_skb: 141 callbacks suppressed [ 2422.995514] audit: type=1400 audit(2000001109.560:1611): avc: denied { map } for pid=30399 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2423.185317] ntfs: (device loop3): parse_options(): Unrecognized mount option . [ 2423.193030] audit: type=1400 audit(2000001109.560:1612): avc: denied { map } for pid=30399 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2423.324501] audit: type=1400 audit(2000001109.580:1613): avc: denied { map } for pid=30403 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2423.479804] audit: type=1400 audit(2000001109.600:1614): avc: denied { map } for pid=30403 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2423.628219] audit: type=1400 audit(2000001109.630:1615): avc: denied { create } for pid=30406 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2423.794738] audit: type=1400 audit(2000001109.640:1616): avc: denied { ioctl } for pid=30406 comm="syz-executor.5" path="socket:[511774]" dev="sockfs" ino=511774 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xb}, 0x0) [ 2424.062837] audit: type=1400 audit(2000001109.790:1617): avc: denied { map } for pid=30412 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2424.162295] audit: type=1400 audit(2000001109.790:1618): avc: denied { map } for pid=30412 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2424.266341] audit: type=1400 audit(2000001109.810:1619): avc: denied { map } for pid=30412 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2424.326038] validate_nla: 1 callbacks suppressed [ 2424.326048] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2424.347957] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2424.379828] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000600153b4", 0x33fe0}], 0x1}, 0x0) 03:51:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000015d3c000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000002ec0), 0x4000000000009fc, 0x2, &(0x7f00000001c0)={0x77359400}) syz_mount_image$ntfs(&(0x7f0000004680)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\b']) 03:51:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf}, 0x0) [ 2426.116320] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2426.123831] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x367, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000602000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000353b4", 0x33fe0}], 0x1}, 0x0) 03:51:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6082}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) close(r0) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x5) ftruncate(r2, 0x1000000) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$ax25(r4, &(0x7f0000000100)={{0x3, @null, 0x5}, [@bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) 03:51:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001003f000153b4", 0x33fe0}], 0x1}, 0x0) [ 2426.700688] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:51:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000603000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2427.074904] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:51:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000010d53b4", 0x33fe0}], 0x1}, 0x0) 03:51:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x10}, 0x0) [ 2428.010701] kauditd_printk_skb: 139 callbacks suppressed [ 2428.010714] audit: type=1400 audit(2000001114.570:1758): avc: denied { map } for pid=30970 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2428.083359] audit: type=1400 audit(2000001114.570:1759): avc: denied { map } for pid=30970 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2428.135579] audit: type=1400 audit(2000001114.580:1760): avc: denied { create } for pid=30968 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:54 executing program 3: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRES32=0x0], 0x1}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000600)={0x0, 0x8000, 0x7, 'queue1\x00'}) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1a, 0x1000) bind$unix(r4, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e) unshare(0x40000000) [ 2428.211168] audit: type=1400 audit(2000001114.580:1761): avc: denied { write } for pid=30968 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2428.284018] audit: type=1400 audit(2000001114.580:1762): avc: denied { map } for pid=30970 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2428.368516] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2428.431642] audit: type=1400 audit(2000001114.630:1763): avc: denied { map } for pid=30970 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2428.433271] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2428.483204] audit: type=1400 audit(2000001114.630:1764): avc: denied { map } for pid=30970 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2428.524183] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:51:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000604000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2428.628144] audit: type=1400 audit(2000001114.680:1765): avc: denied { map } for pid=30970 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:51:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x48}, 0x0) [ 2428.771776] audit: type=1400 audit(2000001114.680:1766): avc: denied { map } for pid=30970 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2428.834029] audit: type=1400 audit(2000001114.700:1767): avc: denied { map } for pid=30970 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:51:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010040000153b4", 0x33fe0}], 0x1}, 0x0) [ 2429.060366] IPVS: ftp: loaded support on port[0] = 21 [ 2429.621885] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2429.662482] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2429.679292] IPVS: ftp: loaded support on port[0] = 21 03:51:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x368, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:51:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000001b53b4", 0x33fe0}], 0x1}, 0x0) 03:51:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000605000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:56 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') sendfile(r0, r1, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000840)='/dev/uinput\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x200100, 0x0) getdents(r3, &(0x7f00000005c0)=""/223, 0xfc61) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r6, r4, 0x0) socket(0x10, 0x3, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x30, 0x5, 0x3, 0x4, 0x2, 0x0, 0x100, 0x35}, 0x0) socket$nl_route(0x10, 0x3, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast2}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, 0x0) add_key(&(0x7f0000000000)='ceph\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 03:51:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x4c}, 0x0) [ 2430.701829] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:51:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010048000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000606000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2431.969414] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2432.002908] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2432.042000] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:51:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x60}, 0x0) 03:51:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x369, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2432.121666] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:51:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000002053b4", 0x33fe0}], 0x1}, 0x0) 03:51:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001004c000153b4", 0x33fe0}], 0x1}, 0x0) 03:51:59 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0xffffffff}) [ 2433.016224] kauditd_printk_skb: 178 callbacks suppressed [ 2433.016237] audit: type=1400 audit(2000001119.550:1945): avc: denied { write } for pid=31536 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2433.152192] audit: type=1400 audit(2000001119.610:1947): avc: denied { map } for pid=31538 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.213925] audit: type=1400 audit(2000001119.620:1948): avc: denied { map } for pid=31535 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.335769] audit: type=1400 audit(2000001119.630:1949): avc: denied { map } for pid=31538 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.399430] audit: type=1400 audit(2000001119.640:1950): avc: denied { map } for pid=31538 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.451897] audit: type=1400 audit(2000001119.650:1951): avc: denied { map } for pid=31535 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.476714] audit: type=1400 audit(2000001119.660:1953): avc: denied { map } for pid=31535 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.501368] audit: type=1400 audit(2000001119.660:1952): avc: denied { create } for pid=31540 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2433.533348] audit: type=1400 audit(2000001119.670:1954): avc: denied { map } for pid=31538 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.558563] audit: type=1400 audit(2000001119.670:1955): avc: denied { map } for pid=31538 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2433.596813] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:52:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x68}, 0x0) [ 2433.639451] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000607000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000013c5d000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x13, 0x3, &(0x7f0000000140)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x35}, [@alu={0x4, 0x0, 0x9, 0x1, 0x1, 0xdfa26f5a5a49e2e6, 0xffffffffffffffe8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8}, @generic={0x6, 0x2, 0x9, 0x40, 0x2}, @jmp={0x5, 0x1, 0x0, 0x2, 0x3}, @alu={0x7, 0x0, 0x5, 0x6, 0xb, 0xffffffffffffffc0}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @alu={0x4, 0x0, 0x1e, 0x9, 0x6, 0x20}, @jmp={0x5, 0x0, 0x0, 0xbe28ade9160e55f2, 0x9, 0xc, 0x6d4b1265bf8026e1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1}, @generic={0x7, 0x1, 0x5, 0x5, 0x3}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x275, &(0x7f0000000200)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffd6}, 0x48) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000100)={0xfff}) [ 2434.733790] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:52:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000003553b4", 0x33fe0}], 0x1}, 0x0) 03:52:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @multicast2}, 0x10) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x125a82, 0x2) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000140)={0x8, 0x0, [{0x40000001, 0x8000, 0x4, 0x4, 0x5}, {0xd, 0x3, 0x4, 0x80000000, 0x4}, {0x0, 0x7, 0x4, 0x7f, 0xfffffffe}, {0x40000001, 0x7, 0x7, 0x7eb, 0x10000}, {0x0, 0x4, 0x0, 0x40, 0x20c}, {0x18000000a, 0x2, 0x6, 0xb10}, {0x4, 0x4, 0x2231875d, 0x64dd, 0x5}, {0xc0000001, 0x1ff, 0x0, 0x4000, 0x20}]}) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r3, 0x5, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xff\xcf\xa5\xb6\xc5&y\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10008081}, 0xf3a34084ddcf5521) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x100, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendto(r0, &(0x7f0000000100)="16", 0x100000, 0x8055, 0x0, 0x44d) 03:52:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6c}, 0x0) 03:52:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010060000153b4", 0x33fe0}], 0x1}, 0x0) [ 2437.136275] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2437.143837] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:52:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}, 0x20000}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 03:52:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x36a, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x74}, 0x0) 03:52:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000003f53b4", 0x33fe0}], 0x1}, 0x0) 03:52:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000608000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2437.576984] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2437.655739] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010068000153b4", 0x33fe0}], 0x1}, 0x0) [ 2438.031455] kauditd_printk_skb: 120 callbacks suppressed [ 2438.031467] audit: type=1400 audit(2000001124.590:2076): avc: denied { map } for pid=32106 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2438.184631] audit: type=1400 audit(2000001124.600:2077): avc: denied { map } for pid=32106 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2438.328655] audit: type=1400 audit(2000001124.600:2078): avc: denied { map } for pid=32100 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2438.504089] audit: type=1400 audit(2000001124.600:2079): avc: denied { map } for pid=32106 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x7a}, 0x0) [ 2438.658474] audit: type=1400 audit(2000001124.640:2080): avc: denied { map } for pid=32100 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:05 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000240)='./control\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x7) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f00000000c0)=0xfffffff9) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./control\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = open(&(0x7f00000001c0)='./control\x00', 0x0, 0x0) unlinkat(r8, &(0x7f0000000180)='./file0\x00', 0x200) rmdir(&(0x7f0000000080)='./control\x00') [ 2438.848229] audit: type=1400 audit(2000001124.640:2081): avc: denied { map } for pid=32100 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2439.029678] audit: type=1400 audit(2000001124.660:2082): avc: denied { map } for pid=32106 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2439.152189] audit: type=1400 audit(2000001124.660:2083): avc: denied { map } for pid=32108 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2439.220094] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2439.243787] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2439.312710] audit: type=1400 audit(2000001124.680:2084): avc: denied { map } for pid=32108 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000609000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000004053b4", 0x33fe0}], 0x1}, 0x0) [ 2439.504870] audit: type=1400 audit(2000001124.680:2085): avc: denied { map } for pid=32108 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf0}, 0x0) 03:52:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="5c04000024000505000000000000000800000000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008001b006362710030040200180001003b00000000000000000000000000000000000000100005003f000000000000000100000004040600000000000000000000000000000000000000000000000000000000000000000000164d000000000000000000000000000000f2000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000edff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff7f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000f100fc2f65f9bd33e25d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feff00000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000bd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002bd4658fcaea600892ddcbc2bf8e3c7e58239f1bc68357790d8493876f4878b0d9252e9e836f4ff73cb7d3e1c1d2de7c841b6104be75c882354feabdce58edc760acf5ffdcfc231083e9990a37d63dc43f549d7a341f7347036f178fa1ba00010094e52dde9ce89e730000200000000000000000c3aa97a6cd1d8ae2d7181c93e298bf515f7bd2c08a3a6c527d143db5e1d3b96cfb78d1909d138f962764cbf627a98affdeff7f62fa0f56398930622aef64d0e7a77c1f77177c567bc79e93ce01050cd0f91c779062c4"], 0x45c}}, 0x0) r2 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:52:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x36b, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00060a000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2440.965740] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2441.025313] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2441.035732] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:52:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000006453b4", 0x33fe0}], 0x1}, 0x0) 03:52:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001006c000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:07 executing program 3: 03:52:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x300}, 0x0) 03:52:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(0x0) r0 = socket(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x40000, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000001c0)=0x1) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4fe9fd4ed3473ecd) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r5, 0x0, 0x10005, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x35) ftruncate(r6, 0x200004) sendfile(r2, r6, 0x0, 0x80001d00c0d0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000300), 0x0) prctl$PR_CAPBSET_DROP(0x18, 0xa) 03:52:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x500}, 0x0) [ 2442.637617] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2442.686156] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2442.716734] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2442.736930] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:52:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000008153b4", 0x33fe0}], 0x1}, 0x0) 03:52:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00060b000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2443.189251] kauditd_printk_skb: 137 callbacks suppressed [ 2443.189264] audit: type=1400 audit(2000001129.750:2223): avc: denied { create } for pid=32754 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:52:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010074000153b4", 0x33fe0}], 0x1}, 0x0) [ 2443.330064] audit: type=1400 audit(2000001129.820:2224): avc: denied { map } for pid=32761 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2443.499534] audit: type=1400 audit(2000001129.820:2225): avc: denied { map } for pid=32761 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2443.627905] audit: type=1400 audit(2000001129.840:2226): avc: denied { map } for pid=32761 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2443.740276] audit: type=1400 audit(2000001129.840:2227): avc: denied { map } for pid=32761 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2443.867631] audit: type=1400 audit(2000001129.950:2228): avc: denied { map } for pid=32761 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x600}, 0x0) [ 2443.983068] audit: type=1400 audit(2000001129.950:2229): avc: denied { map } for pid=32761 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2444.092235] audit: type=1400 audit(2000001130.010:2230): avc: denied { map } for pid=32761 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2444.162183] device nr0 entered promiscuous mode [ 2444.225852] audit: type=1400 audit(2000001130.050:2231): avc: denied { map } for pid=32761 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2444.359467] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2444.383388] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2444.403238] audit: type=1400 audit(2000001130.060:2232): avc: denied { map } for pid=32761 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x36c, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x700}, 0x0) [ 2445.418044] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:52:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00060e000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:12 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-monitor\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8888, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff), 0x0, 0x0, 0x0, 0x0) [ 2445.468183] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2445.500817] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:52:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001007a000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000253b4", 0x33fe0}], 0x1}, 0x0) 03:52:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x900}, 0x0) 03:52:13 executing program 3: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) getpriority(0x1, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) socket$nl_netfilter(0x10, 0x3, 0xc) socket$packet(0x11, 0x3, 0x300) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:systemd_systemctl_exec_t:s0\x00', 0x2e, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2447.380092] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2447.460931] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:52:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x36d, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00060f000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2447.580594] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2447.606312] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:52:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000353b4", 0x33fe0}], 0x1}, 0x0) 03:52:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100f0000153b4", 0x33fe0}], 0x1}, 0x0) [ 2448.167925] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2448.200196] kauditd_printk_skb: 108 callbacks suppressed [ 2448.200210] audit: type=1400 audit(2000001134.760:2341): avc: denied { map } for pid=882 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000610000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2448.437535] audit: type=1400 audit(2000001134.760:2342): avc: denied { map } for pid=882 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2448.599302] audit: type=1400 audit(2000001134.760:2343): avc: denied { map } for pid=882 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2448.733766] audit: type=1400 audit(2000001134.780:2344): avc: denied { create } for pid=856 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:52:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xa00}, 0x0) [ 2448.875083] audit: type=1400 audit(2000001134.790:2345): avc: denied { create } for pid=870 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2448.992124] audit: type=1400 audit(2000001134.800:2346): avc: denied { map } for pid=882 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2449.072687] audit: type=1400 audit(2000001134.810:2347): avc: denied { write } for pid=870 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2449.133252] audit: type=1400 audit(2000001134.840:2348): avc: denied { create } for pid=869 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2449.174874] audit: type=1400 audit(2000001134.850:2350): avc: denied { map } for pid=834 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2449.206533] audit: type=1400 audit(2000001134.850:2349): avc: denied { map } for pid=882 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x104) [ 2449.406014] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2449.505946] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:52:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000453b4", 0x33fe0}], 0x1}, 0x0) 03:52:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xb00}, 0x0) 03:52:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000648000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, 0x0, 0x2, [{{0x2, 0x0, @dev}}]}, 0x3f9) 03:52:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf00}, 0x0) [ 2451.717190] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2451.737334] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x36e, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2451.767203] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2451.796092] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:52:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000253b4", 0x33fe0}], 0x1}, 0x0) 03:52:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000853b4", 0x33fe0}], 0x1}, 0x0) 03:52:18 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/231, 0xe7}], 0x1) writev(r1, &(0x7f0000002ec0)=[{&(0x7f0000001c00)="cf796500c9e055006a2d7ce93eabe67a259069a4dc21d6b598d8becfe3da7af7d9b82073680c09e33f70d82d7e96a4acb78a093be482a6f9a2e0e0584f929c1a43961d255e59758b1028a5a59028dd18bf743b9df943267618991d2455fba60bf0bcf7f8d474920c3df78e23ddd715387c57c7b6e76604bf346c758095e2fc319f6968", 0x83}, {&(0x7f0000001cc0)="29151a47f9285b0467170053de4e5548b245a6b3b13a93edfe96b00b38ae3698e5e3028c2fead67ee48d343a5b9f289b96b8a35edc6d0a6a44911e1a4046686b9306f6ad227c02b03a918cdfdea3e7d6a098266241ede70ecd2f93cfb8b75dd53987f823b4", 0x65}], 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000040)='b', 0x347fff08) 03:52:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00064c000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2452.513209] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2452.557085] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000353b4", 0x33fe0}], 0x1}, 0x0) 03:52:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x2000}, 0x0) [ 2453.232161] kauditd_printk_skb: 140 callbacks suppressed [ 2453.232176] audit: type=1400 audit(2000001139.790:2491): avc: denied { create } for pid=1327 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2453.362431] audit: type=1400 audit(2000001139.850:2492): avc: denied { write } for pid=1327 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2453.488169] audit: type=1400 audit(2000001140.050:2493): avc: denied { create } for pid=1458 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2453.569659] audit: type=1400 audit(2000001140.080:2494): avc: denied { write } for pid=1458 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2453.641851] audit: type=1400 audit(2000001140.200:2495): avc: denied { create } for pid=1385 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2453.700432] audit: type=1400 audit(2000001140.260:2496): avc: denied { create } for pid=1461 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:52:20 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_ima(0x0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "a774692b1dc6eee41a53a66562fd7b4b"}, 0x11, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), 0x0) r0 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) [ 2453.780833] audit: type=1400 audit(2000001140.260:2497): avc: denied { ioctl } for pid=1461 comm="syz-executor.5" path="socket:[512822]" dev="sockfs" ino=512822 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2453.815889] audit: type=1400 audit(2000001140.300:2498): avc: denied { create } for pid=1461 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2453.845444] audit: type=1400 audit(2000001140.310:2499): avc: denied { create } for pid=1406 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2453.919128] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2453.955784] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:52:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000660000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000001b53b4", 0x33fe0}], 0x1}, 0x0) 03:52:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x2cf2}, 0x0) [ 2454.384434] audit: type=1400 audit(2000001140.940:2500): avc: denied { map } for pid=1585 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2455.249281] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2455.300965] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x36f, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2455.381684] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2455.411145] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:52:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000553b4", 0x33fe0}], 0x1}, 0x0) [ 2455.560431] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2455.643629] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:52:22 executing program 3: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) io_setup(0x2344, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 03:52:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x4800}, 0x0) 03:52:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000668000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000003553b4", 0x33fe0}], 0x1}, 0x0) [ 2456.379780] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2456.436332] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2456.562392] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:52:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000853b4", 0x33fe0}], 0x1}, 0x0) 03:52:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00066c000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:23 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$binfmt_script(r0, 0x0, 0x322) 03:52:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x4c00}, 0x0) [ 2457.537005] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2457.583248] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2457.660863] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:52:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x370, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2457.740813] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:52:24 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000000)=0xa2ea) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 03:52:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000953b4", 0x33fe0}], 0x1}, 0x0) 03:52:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000674000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000006453b4", 0x33fe0}], 0x1}, 0x0) [ 2458.357267] kauditd_printk_skb: 108 callbacks suppressed [ 2458.357280] audit: type=1400 audit(2000001144.920:2609): avc: denied { create } for pid=1919 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2458.533129] audit: type=1400 audit(2000001145.010:2610): avc: denied { map } for pid=1942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2458.679358] audit: type=1400 audit(2000001145.010:2611): avc: denied { map } for pid=1942 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2458.782447] audit: type=1400 audit(2000001145.010:2612): avc: denied { map } for pid=1942 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2458.952241] audit: type=1400 audit(2000001145.010:2613): avc: denied { map } for pid=1942 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2459.098348] audit: type=1400 audit(2000001145.050:2614): avc: denied { map } for pid=1942 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6000}, 0x0) [ 2459.218669] audit: type=1400 audit(2000001145.080:2615): avc: denied { map } for pid=1947 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2459.374440] audit: type=1400 audit(2000001145.080:2616): avc: denied { map } for pid=1942 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2459.420454] audit: type=1400 audit(2000001145.090:2617): avc: denied { map } for pid=1942 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2459.450286] audit: type=1400 audit(2000001145.090:2618): avc: denied { map } for pid=1947 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8921, &(0x7f0000000040)={'bond0\x00\x00z\a!\x00\x00\x00\x06\x00\x05', @ifru_settings={0x4, 0x1, @cisco=&(0x7f0000000100)={0x5, 0x7}}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$input_event(r2, &(0x7f0000000000)={{0x0, 0x7530}, 0x21a3326ca2a16c95, 0x101, 0xfffffc01}, 0x18) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$rose(r6, 0x104, 0x2, &(0x7f0000000080)=0x80, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @local}, &(0x7f0000000140)=0xc) r8 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r8) listen(r8, 0x6) setsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000200)={@empty, @multicast2, r7}, 0xc) [ 2459.790657] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2459.841091] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6800}, 0x0) [ 2459.899518] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2459.925689] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:52:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00067a000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000a53b4", 0x33fe0}], 0x1}, 0x0) [ 2460.871498] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:52:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0xf}], 0x1}, 0x0) 03:52:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x371, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6c00}, 0x0) [ 2461.390416] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:52:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006f0000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2461.565471] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2461.616628] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000010d53b4", 0x33fe0}], 0x1}, 0x0) 03:52:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1}, 0x0) 03:52:28 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000f10d000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x2000009, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4100}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x7c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_MEDIA={0x2c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffc20b}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x48001) [ 2462.458783] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2462.519248] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2462.557369] validate_nla: 1 callbacks suppressed [ 2462.557379] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:52:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x7400}, 0x0) 03:52:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000659020000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001ffffff1f53b4", 0x33fe0}], 0x1}, 0x0) 03:52:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x30}], 0x1}, 0x0) [ 2463.236370] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2463.298547] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 2463.382226] kauditd_printk_skb: 141 callbacks suppressed [ 2463.382240] audit: type=1400 audit(2000001149.940:2760): avc: denied { create } for pid=2505 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2463.536829] F2FS-fs (loop3): Fix alignment : internally, start(5120) end(12288) block(6656) [ 2463.560854] audit: type=1400 audit(2000001150.000:2761): avc: denied { map } for pid=2502 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2463.616523] attempt to access beyond end of device [ 2463.654638] loop3: rw=12288, want=8200, limit=20 [ 2463.692135] attempt to access beyond end of device [ 2463.704441] loop3: rw=12288, want=12296, limit=20 [ 2463.729105] audit: type=1400 audit(2000001150.010:2762): avc: denied { create } for pid=2505 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2463.779113] F2FS-fs (loop3): Failed to get valid F2FS checkpoint [ 2463.848199] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 2463.968986] audit: type=1400 audit(2000001150.020:2763): avc: denied { map } for pid=2502 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2464.037523] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 03:52:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600030000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x372, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2464.155842] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2464.175644] attempt to access beyond end of device 03:52:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x7a00}, 0x0) [ 2464.205481] audit: type=1400 audit(2000001150.020:2764): avc: denied { map } for pid=2502 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2464.211042] loop3: rw=12288, want=8200, limit=20 [ 2464.283698] attempt to access beyond end of device [ 2464.290676] loop3: rw=12288, want=12296, limit=20 [ 2464.295207] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2464.330737] F2FS-fs (loop3): Failed to get valid F2FS checkpoint [ 2464.357036] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2464.388697] audit: type=1400 audit(2000001150.070:2765): avc: denied { map } for pid=2502 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0xec0}], 0x1}, 0x0) [ 2464.561341] audit: type=1400 audit(2000001150.070:2766): avc: denied { map } for pid=2502 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2464.729239] audit: type=1400 audit(2000001150.170:2767): avc: denied { map } for pid=2497 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:31 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f00006ff000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r2, 0x4c01) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x1c, r6, 0x403, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x2}]}, 0x1c}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r10}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r10, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @rand_addr=0x6}, @ib={0x1b, 0x3, 0x4, {"feee7a9c7a8f3c2226acf71f58fe1bbd"}, 0x3f, 0x400, 0x3}}}, 0x118) getsockname$packet(r8, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) sendmsg$FOU_CMD_GET(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2008}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x7c, r6, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_IFINDEX={0x8, 0xb, r11}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x12}}, @FOU_ATTR_AF={0x8, 0x2, 0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) [ 2464.860011] audit: type=1400 audit(2000001150.170:2768): avc: denied { map } for pid=2497 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2465.011861] audit: type=1400 audit(2000001150.200:2769): avc: denied { map } for pid=2502 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600050000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000002553b4", 0x33fe0}], 0x1}, 0x0) 03:52:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf000}, 0x0) [ 2465.969034] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2465.995720] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2466.004406] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x373, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x34000}], 0x1}, 0x0) [ 2466.120199] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2466.179614] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 03:52:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000003553b4", 0x33fe0}], 0x1}, 0x0) 03:52:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600060000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000000)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='usrj1uota=./file0,\x00']) 03:52:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x200341e0}], 0x1}, 0x0) 03:52:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf22c}, 0x0) [ 2467.354306] EXT4-fs (loop3): Unrecognized mount option "usrj1uota=./file0" or missing value 03:52:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="000002", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r4}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x5, 0x8, 0x1, 0x5, r4}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r5, 0x9}, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, 0x0, 0x0) 03:52:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x7ffff000}], 0x1}, 0x0) [ 2468.011975] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2468.206287] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2468.278469] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0xfffffdef}], 0x1}, 0x0) 03:52:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600070000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000003f53b4", 0x33fe0}], 0x1}, 0x0) [ 2468.731271] kauditd_printk_skb: 164 callbacks suppressed [ 2468.731308] audit: type=1400 audit(2000001155.290:2934): avc: denied { map } for pid=3213 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2468.926331] audit: type=1400 audit(2000001155.290:2935): avc: denied { map } for pid=3213 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2469.130142] audit: type=1400 audit(2000001155.290:2936): avc: denied { map } for pid=3213 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2469.256549] audit: type=1400 audit(2000001155.290:2937): avc: denied { map } for pid=3213 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2469.257767] sctp: [Deprecated]: syz-executor.3 (pid 3244) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2469.257767] Use struct sctp_sack_info instead [ 2469.370291] audit: type=1400 audit(2000001155.310:2938): avc: denied { map } for pid=3213 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2469.443875] audit: type=1400 audit(2000001155.360:2939): avc: denied { map } for pid=3213 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2469.482817] audit: type=1400 audit(2000001155.360:2940): avc: denied { map } for pid=3213 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2469.514894] audit: type=1400 audit(2000001155.400:2941): avc: denied { map } for pid=3213 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2469.612988] audit: type=1400 audit(2000001155.420:2942): avc: denied { map } for pid=3213 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2469.654781] audit: type=1400 audit(2000001155.480:2943): avc: denied { map } for pid=3213 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2469.749393] sctp: [Deprecated]: syz-executor.3 (pid 3252) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2469.749393] Use struct sctp_sack_info instead 03:52:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x374, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x34000}, 0x0) 03:52:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x2}, 0x0) 03:52:36 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x0) fcntl$dupfd(r2, 0x203, r3) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r4, 0xc0305710, &(0x7f0000000000)={0x1, 0x7, 0x9, 0xffff8001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$MON_IOCT_RING_SIZE(r6, 0x9204, 0x7898b) listen(r0, 0xffff) socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback, 0xfffffffe}], 0x1c) [ 2469.858922] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2469.881935] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2469.946063] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600090000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000004053b4", 0x33fe0}], 0x1}, 0x0) [ 2470.110845] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2470.278125] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:52:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x3}, 0x0) 03:52:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x400300}, 0x0) 03:52:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x4}, 0x0) 03:52:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x20, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='rxrpc\x00', 0x0, 0x0, 0x0) [ 2471.885452] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2471.987121] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000005253b4", 0x33fe0}], 0x1}, 0x0) 03:52:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x8}, 0x0) [ 2472.433699] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2473.560192] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2473.597100] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:40 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}}}, 0x30) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x2000, 0x2, 0x12, r0, 0x0) r1 = msgget$private(0x0, 0x80) msgsnd(r1, &(0x7f00000000c0)={0x0, "ba22158c5a820625f90303388f421fb25f26b541139b7583256410a71560dde199fcecd72e8bcd4e83c0d47cc99a4a2546dc6a757753b8b1c1bebe724b7fd77a1f14c7e9ca2ba74f2733a0039f535253c0624b1fdd026df06263aa33852bda52da38b7f5e1746962ee0d63140279d6667d4d3274f2298f95c288c61ce08ad327967ae0b6494ed0c5764bf6058b8570d28065cee4a3f56938eecb700d26e3018a9803bfc7fc80be5de895fb54dc2f690c8b1e806c6fbecf70fc70ff036c5e138d7cf945e5da81a9a4f68c8220427bf5fe2ca22695"}, 0xdc, 0x800) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000280)={0x7, 0x8}, 0x10) 03:52:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x375, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1b}, 0x0) 03:52:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6b6b6b}, 0x0) 03:52:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000a0000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000175cc7d5953b4", 0x33fe0}], 0x1}, 0x0) [ 2473.752792] kauditd_printk_skb: 145 callbacks suppressed [ 2473.752807] audit: type=1400 audit(2000001160.310:3089): avc: denied { map } for pid=3611 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2473.777656] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2473.860416] audit: type=1400 audit(2000001160.320:3090): avc: denied { write } for pid=3614 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:52:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000b0000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2473.985856] audit: type=1400 audit(2000001160.370:3091): avc: denied { create } for pid=3613 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:52:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$inet6(0xa, 0x802, 0x0) sync() connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0xffffffffffffffff) r2 = dup(r1) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x7) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000002480000000000000a3d6dbf253ff683c14400000", @ANYRES32=0x0, @ANYBLOB='\x00'/12]}, 0x1, 0x0, 0x0, 0x4000014}, 0x2910) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, 0x0) write$P9_RRENAME(r3, &(0x7f0000000080)={0x7, 0x15, 0x2}, 0x7) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e21, @broadcast}}, [0x200, 0x130, 0x5, 0x401, 0x6, 0x7, 0x30, 0x7, 0x0, 0x101, 0x20, 0x9, 0x0, 0x9e2, 0x6]}, 0x0) [ 2474.160985] audit: type=1400 audit(2000001160.380:3092): avc: denied { ioctl } for pid=3613 comm="syz-executor.5" path="socket:[514627]" dev="sockfs" ino=514627 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:52:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x35}, 0x0) [ 2474.301717] audit: type=1400 audit(2000001160.400:3093): avc: denied { create } for pid=3613 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2474.461364] audit: type=1400 audit(2000001160.440:3094): avc: denied { map } for pid=3615 comm="syz-executor.3" path="/dev/dsp" dev="devtmpfs" ino=16702 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 03:52:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf0ffff}, 0x0) [ 2474.628466] audit: type=1400 audit(2000001160.450:3095): avc: denied { create } for pid=3614 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:52:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000e0000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2474.819663] audit: type=1400 audit(2000001160.530:3096): avc: denied { map } for pid=3615 comm="syz-executor.3" path="/dev/dsp" dev="devtmpfs" ino=16702 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 [ 2475.004238] audit: type=1400 audit(2000001160.630:3097): avc: denied { create } for pid=3619 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2475.181483] audit: type=1400 audit(2000001160.680:3099): avc: denied { write } for pid=3619 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:52:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000005d53b4", 0x33fe0}], 0x1}, 0x0) 03:52:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x64}, 0x0) 03:52:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x376, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000f0000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)=0x100000000) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000048c}, 0xc, &(0x7f00000004c0)={0x0}}, 0x20000805) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000480), 0xffffffffffffff39, 0x0, 0x0, 0x150) 03:52:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x1000000}, 0x0) 03:52:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x10d}, 0x0) [ 2477.149462] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2477.238600] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2477.552394] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:52:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600200000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:44 executing program 3: mkdir(&(0x7f0000000180)='./bus\x00', 0x0) syz_mount_image$gfs2(&(0x7f0000000200)='gfs2\x00', &(0x7f00000002c0)='./bus/file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f636b70726f746f3d646c6d2c6c6f636b7461626c653d6f76190065726c6179009d2d46b878d1b0eb0d98b413ac2014ae3364314b0fb3589e76498d4d433b7bc1b8404455a7c50e4ebcda36444f60d33e577854387e222cedf96b20dff772f894e65b5ede371032c4f535f5204e9b6355cd8c710ff9607105afe89ae5be35273497e36e2bf296cb9a"]) 03:52:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x300}, 0x0) 03:52:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000175cc7d5f53b4", 0x33fe0}], 0x1}, 0x0) 03:52:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x2000000}, 0x0) [ 2478.540866] gfs2: can't find protocol dlm 03:52:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f0000000040)={0xa927, 0x29, 0x0, 0xffffffffffffffff}) r7 = dup(r6) syz_kvm_setup_cpu$x86(r7, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0xc) 03:52:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0xffffff1f}, 0x0) [ 2478.780162] kauditd_printk_skb: 143 callbacks suppressed [ 2478.780176] audit: type=1400 audit(2000001165.340:3242): avc: denied { map } for pid=4187 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2478.961080] audit: type=1400 audit(2000001165.370:3243): avc: denied { map } for pid=4187 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2478.969555] syz-executor.2 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 2479.078095] audit: type=1400 audit(2000001165.370:3244): avc: denied { map } for pid=4187 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2479.154645] audit: type=1400 audit(2000001165.430:3245): avc: denied { map } for pid=4187 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2479.241834] audit: type=1400 audit(2000001165.430:3246): avc: denied { map } for pid=4187 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2479.278094] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 2479.287795] CPU: 1 PID: 4094 Comm: syz-executor.2 Not tainted 4.19.81 #0 [ 2479.295379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2479.306134] Call Trace: [ 2479.309066] dump_stack+0x172/0x1f0 [ 2479.312829] dump_header+0x15e/0xa55 [ 2479.316692] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2479.321938] ? ___ratelimit+0x60/0x595 [ 2479.325890] ? do_raw_spin_unlock+0x57/0x270 [ 2479.330523] oom_kill_process.cold+0x10/0x6ef [ 2479.335237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2479.341234] ? task_will_free_mem+0x139/0x6e0 [ 2479.345855] out_of_memory+0x362/0x1330 [ 2479.350041] ? lock_downgrade+0x880/0x880 [ 2479.354654] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2479.359790] ? oom_killer_disable+0x280/0x280 [ 2479.364394] ? find_held_lock+0x35/0x130 [ 2479.368505] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2479.373634] ? memcg_event_wake+0x230/0x230 [ 2479.378085] ? do_raw_spin_unlock+0x57/0x270 [ 2479.383025] ? _raw_spin_unlock+0x2d/0x50 [ 2479.387347] try_charge+0xef7/0x1480 [ 2479.391100] ? percpu_ref_tryget_live+0xef/0x290 [ 2479.395986] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2479.400945] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2479.405907] ? find_held_lock+0x35/0x130 [ 2479.410086] ? get_mem_cgroup_from_mm+0x139/0x320 [ 2479.415242] memcg_kmem_charge_memcg+0x83/0x170 [ 2479.420113] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2479.424648] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2479.430128] memcg_kmem_charge+0x136/0x370 [ 2479.434393] __alloc_pages_nodemask+0x3c3/0x750 [ 2479.439181] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2479.444227] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2479.448924] ? trace_hardirqs_on+0x67/0x220 [ 2479.453502] ? kasan_check_read+0x11/0x20 [ 2479.457815] copy_process.part.0+0x3e0/0x7a30 [ 2479.462519] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2479.467810] ? delayacct_end+0x5c/0x100 [ 2479.471824] ? __delayacct_freepages_end+0xe0/0x140 [ 2479.476873] ? __lock_acquire+0x6ee/0x49c0 [ 2479.481148] ? __cleanup_sighand+0x70/0x70 [ 2479.485669] ? mark_held_locks+0x100/0x100 [ 2479.489963] _do_fork+0x257/0xfd0 [ 2479.493528] ? fork_idle+0x1d0/0x1d0 [ 2479.497300] ? blkg_prfill_rwstat_field_recursive+0x100/0x100 [ 2479.497316] ? kasan_check_read+0x11/0x20 [ 2479.497334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2479.512827] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2479.517601] ? do_syscall_64+0x26/0x620 [ 2479.517619] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2479.517632] ? do_syscall_64+0x26/0x620 [ 2479.517651] __x64_sys_clone+0xbf/0x150 [ 2479.517668] do_syscall_64+0xfd/0x620 [ 2479.517682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2479.517693] RIP: 0033:0x45c919 [ 2479.517707] Code: ff 48 85 f6 0f 84 d7 8c fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8c fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 2479.517718] RSP: 002b:00007ffd22df9578 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 2479.576177] RAX: ffffffffffffffda RBX: 00007ff94d005700 RCX: 000000000045c919 [ 2479.583714] RDX: 00007ff94d0059d0 RSI: 00007ff94d004db0 RDI: 00000000003d0f00 [ 2479.591098] RBP: 00007ffd22df9790 R08: 00007ff94d005700 R09: 00007ff94d005700 [ 2479.598399] R10: 00007ff94d0059d0 R11: 0000000000000202 R12: 0000000000000000 [ 2479.605690] R13: 00007ffd22df962f R14: 00007ff94d0059c0 R15: 000000000075c07c [ 2479.626445] Task in /syz2 killed as a result of limit of /syz2 [ 2479.641391] memory: usage 307184kB, limit 307200kB, failcnt 4234 [ 2479.677378] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2479.697345] audit: type=1400 audit(2000001165.470:3247): avc: denied { create } for pid=4094 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2479.780481] audit: type=1400 audit(2000001165.480:3248): avc: denied { map } for pid=4187 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2479.814658] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2479.824192] Memory cgroup stats for /syz2: cache:0KB rss:157296KB rss_huge:133120KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:157416KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2479.900304] audit: type=1400 audit(2000001165.480:3249): avc: denied { map } for pid=4187 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2479.905748] Memory cgroup out of memory: Kill process 21721 (syz-executor.2) score 1113 or sacrifice child [ 2479.941875] Killed process 21721 (syz-executor.2) total-vm:72720kB, anon-rss:2216kB, file-rss:35800kB, shmem-rss:0kB [ 2479.993418] audit: type=1400 audit(2000001165.510:3250): avc: denied { write } for pid=4094 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2480.032969] syz-executor.2 invoked oom-killer: gfp_mask=0x6040d0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), nodemask=(null), order=0, oom_score_adj=1000 [ 2480.035686] audit: type=1400 audit(2000001165.620:3251): avc: denied { create } for pid=4190 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2480.085329] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 2480.110921] CPU: 0 PID: 4146 Comm: syz-executor.2 Not tainted 4.19.81 #0 [ 2480.118241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2480.127824] Call Trace: [ 2480.130434] dump_stack+0x172/0x1f0 [ 2480.134084] dump_header+0x15e/0xa55 [ 2480.137919] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2480.143259] ? ___ratelimit+0x60/0x595 [ 2480.147167] ? do_raw_spin_unlock+0x57/0x270 [ 2480.151606] oom_kill_process.cold+0x10/0x6ef [ 2480.156691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2480.162513] ? task_will_free_mem+0x139/0x6e0 [ 2480.167316] out_of_memory+0x362/0x1330 [ 2480.171320] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2480.176452] ? oom_killer_disable+0x280/0x280 [ 2480.181023] ? find_held_lock+0x35/0x130 [ 2480.185337] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2480.190201] ? memcg_event_wake+0x230/0x230 [ 2480.194755] ? do_raw_spin_unlock+0x57/0x270 [ 2480.199555] ? _raw_spin_unlock+0x2d/0x50 [ 2480.203905] try_charge+0xc4e/0x1480 [ 2480.207652] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2480.212875] ? rcu_read_lock_sched_held+0x110/0x130 [ 2480.218006] ? __alloc_pages_nodemask+0x632/0x750 [ 2480.222897] memcg_kmem_charge_memcg+0x83/0x170 [ 2480.227773] ? mark_held_locks+0xb1/0x100 [ 2480.232032] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2480.237588] ? cache_grow_begin+0x597/0x8c0 [ 2480.242043] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2480.246722] ? trace_hardirqs_on+0x67/0x220 [ 2480.251300] cache_grow_begin+0x3fa/0x8c0 [ 2480.256268] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2480.262455] ? __cpuset_node_allowed+0x136/0x540 [ 2480.269402] fallback_alloc+0x1fd/0x2d0 [ 2480.273673] ____cache_alloc_node+0x1be/0x1e0 [ 2480.278178] kmem_cache_alloc+0x1f3/0x700 [ 2480.282479] ? lookup_one_len+0x10e/0x1a0 [ 2480.286826] alloc_inode+0xb6/0x190 [ 2480.290562] new_inode_pseudo+0x19/0xf0 [ 2480.294633] new_inode+0x1f/0x40 [ 2480.298004] debugfs_get_inode+0x1a/0x130 [ 2480.302146] debugfs_create_dir+0x77/0x3c0 [ 2480.306775] ieee80211_debugfs_add_netdev+0x116/0x1250 [ 2480.312515] ? ieee80211_if_parse_tkip_mic_test+0x850/0x850 [ 2480.318516] ? __lockdep_init_map+0x10c/0x5b0 [ 2480.323529] ? lockdep_init_map+0x9/0x10 [ 2480.327822] ? __raw_spin_lock_init+0x2d/0x100 [ 2480.333017] ieee80211_setup_sdata+0x943/0xfe0 [ 2480.338310] ieee80211_if_add+0xe36/0x1940 [ 2480.342911] ieee80211_register_hw+0x2ea9/0x3800 [ 2480.348053] ? ieee80211_ifa6_changed+0x7d0/0x7d0 [ 2480.352915] ? hrtimer_init+0x8b/0x300 [ 2480.357132] ? mac80211_hwsim_addr_match+0x200/0x200 [ 2480.362338] mac80211_hwsim_new_radio+0x1d83/0x3df0 [ 2480.367881] ? cred_has_capability+0x193/0x320 [ 2480.372706] ? hwsim_exit_net+0xc50/0xc50 [ 2480.376961] ? trace_hardirqs_off+0x62/0x220 [ 2480.381671] hwsim_new_radio_nl+0x5eb/0x893 [ 2480.386360] ? security_capable+0x70/0xc0 [ 2480.390513] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 2480.396498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2480.402483] ? nla_parse+0x1fc/0x2f0 [ 2480.407227] genl_family_rcv_msg+0x6db/0xd30 [ 2480.413443] ? genl_unregister_family+0x790/0x790 [ 2480.418768] ? __local_bh_enable_ip+0x15a/0x270 [ 2480.424300] ? __dev_queue_xmit+0x892/0x2fe0 [ 2480.428884] genl_rcv_msg+0xca/0x170 [ 2480.432951] netlink_rcv_skb+0x17d/0x460 [ 2480.437211] ? genl_family_rcv_msg+0xd30/0xd30 [ 2480.442101] ? netlink_ack+0xb30/0xb30 [ 2480.446350] genl_rcv+0x29/0x40 [ 2480.450138] netlink_unicast+0x537/0x720 [ 2480.454492] ? netlink_attachskb+0x770/0x770 [ 2480.459185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2480.465955] netlink_sendmsg+0x8ae/0xd70 [ 2480.470458] ? netlink_unicast+0x720/0x720 [ 2480.474956] ? selinux_socket_sendmsg+0x36/0x40 [ 2480.480097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2480.486373] ? security_socket_sendmsg+0x8d/0xc0 [ 2480.491549] ? netlink_unicast+0x720/0x720 [ 2480.496862] sock_sendmsg+0xd7/0x130 [ 2480.501147] ___sys_sendmsg+0x803/0x920 [ 2480.505577] ? copy_msghdr_from_user+0x430/0x430 [ 2480.510626] ? lock_downgrade+0x880/0x880 [ 2480.515018] ? kasan_check_read+0x11/0x20 [ 2480.519434] ? __fget+0x367/0x540 [ 2480.523024] ? iterate_fd+0x360/0x360 [ 2480.527633] ? lock_downgrade+0x880/0x880 [ 2480.531794] ? __fget_light+0x1a9/0x230 [ 2480.535917] ? __fdget+0x1b/0x20 [ 2480.539460] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2480.545099] __sys_sendmsg+0x105/0x1d0 [ 2480.553432] ? __ia32_sys_shutdown+0x80/0x80 [ 2480.557974] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2480.562908] ? do_syscall_64+0x26/0x620 [ 2480.567828] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2480.573200] ? do_syscall_64+0x26/0x620 [ 2480.577439] __x64_sys_sendmsg+0x78/0xb0 [ 2480.581523] do_syscall_64+0xfd/0x620 [ 2480.585730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2480.591269] RIP: 0033:0x459f49 [ 2480.594685] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2480.614438] RSP: 002b:00007ff94d046c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2480.623249] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 2480.630848] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2480.639396] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2480.648524] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff94d0476d4 [ 2480.656058] R13: 00000000004c8310 R14: 00000000004de5d8 R15: 00000000ffffffff [ 2480.682403] Task in /syz2 killed as a result of limit of /syz2 [ 2480.697492] memory: usage 304948kB, limit 307200kB, failcnt 4234 [ 2480.710527] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2480.718766] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2480.731510] Memory cgroup stats for /syz2: cache:0KB rss:155212KB rss_huge:131072KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:155252KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2480.759994] Memory cgroup out of memory: Kill process 31874 (syz-executor.2) score 1113 or sacrifice child [ 2480.770648] Killed process 31874 (syz-executor.2) total-vm:72720kB, anon-rss:2216kB, file-rss:35800kB, shmem-rss:0kB [ 2480.875811] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2481.865964] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2481.906337] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x377, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x3000000}, 0x0) 03:52:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x2}, 0x0) 03:52:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='memory.stat\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) r2 = getpid() tkill(r2, 0x800000015) r3 = socket(0x10, 0x200000000080003, 0xc) write(r3, &(0x7f0000000440)="1f00000003027f01fd3f00c007110000f30501000b00060000b625ca3100001f8c169219d70ea6e9c920849adf2b4ae0ea39efea47ca3e6129ecf4f9020f0758cc94fe8cca8ab84a75e364104b057195b65eb19e52eed795ec548210c5247e763af2f28ed45b50a80c4a7545b7ae707822a736631d0972c5b7808a97906be325e1ff5844bec1ca72b88a1676d4d04fae551e462aada100d359689945b29cf7bf3a4de50e25fc5f045042e7f6154eb92d", 0xb0) read(r3, &(0x7f0000000200)=""/102, 0x66) r4 = socket(0x10, 0x200000000080003, 0xc) write(r4, &(0x7f0000000000)="1f00000003027ffffd3f00c007110000f30501000b00060000b67aca310000", 0x1f) read(r4, &(0x7f0000000200)=""/102, 0x66) r5 = socket(0x10, 0x200000000080003, 0xc) write(r5, &(0x7f0000000000)="1f00000003027ffffd3f00c007110000f30511000b00060000b67aca310000", 0x16c) read(r4, &(0x7f0000000200)=""/102, 0xffffffffffffff1c) r6 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x8000) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000500)={{{@in=@initdev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000700)=0xffffffffffffff70) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={@local, @mcast1, @empty, 0x3f, 0x4, 0x400, 0x580, 0x1, 0x10a0002, r7}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) prctl$PR_CAPBSET_READ(0x17, 0x8) r8 = socket(0x10, 0x200000000080003, 0xc) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r10, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write(r10, &(0x7f0000000000)="1f00000003027ffffd3f00c007110000f30501000b00060000b67aca310000", 0x1f) read(r8, &(0x7f0000000200)=""/102, 0x66) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f00000000c0)={0x100000000, 0x6}) setsockopt$inet6_tcp_TLS_RX(r8, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x304}, "1692789d83cf2f4c", "1cda35036e7d70155268ae64ca3268c9e1fc806c9256c430f5adef5d6f26ae16", "6d3ac634", "a94db3f166beed49"}, 0x38) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x21}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 03:52:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600400000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000006253b4", 0x33fe0}], 0x1}, 0x0) [ 2482.756051] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2482.785913] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2482.834402] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:52:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000006353b4", 0x33fe0}], 0x1}, 0x0) [ 2482.916380] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:52:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x4}, 0x0) 03:52:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600480000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x4000000}, 0x0) 03:52:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x5}, 0x0) [ 2483.825975] kauditd_printk_skb: 108 callbacks suppressed [ 2483.825989] audit: type=1400 audit(2000001170.390:3360): avc: denied { create } for pid=4535 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2483.851039] audit: type=1400 audit(2000001170.390:3361): avc: denied { map } for pid=4532 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2483.967607] audit: type=1400 audit(2000001170.420:3362): avc: denied { write } for pid=4535 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2484.077172] audit: type=1400 audit(2000001170.460:3363): avc: denied { map } for pid=4532 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2484.244699] audit: type=1400 audit(2000001170.460:3364): avc: denied { create } for pid=4463 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2484.430603] audit: type=1400 audit(2000001170.470:3365): avc: denied { create } for pid=4536 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:52:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x6}, 0x0) [ 2484.605399] audit: type=1400 audit(2000001170.480:3366): avc: denied { ioctl } for pid=4536 comm="syz-executor.5" path="socket:[514987]" dev="sockfs" ino=514987 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2484.780188] audit: type=1400 audit(2000001170.480:3367): avc: denied { write } for pid=4463 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2484.850780] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2484.859748] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2484.869082] audit: type=1400 audit(2000001170.500:3368): avc: denied { create } for pid=4536 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2484.893647] audit: type=1400 audit(2000001170.670:3369): avc: denied { create } for pid=4551 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2484.925862] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:52:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x378, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x5000000}, 0x0) 03:52:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006004c0000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:52 executing program 3: r0 = socket$inet(0x2, 0x200000000003, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0x28a) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="e0000002ac1414aa000000000a000000ac1414aaffffffffac1414aaac1414aae0000001ac141412ac1414bbe0000002e921d0d1e00000029d843002d06e4b397b65d1570361aa9e79e4654ceb7a7fda176d1d5f7c32184ad798ee997cc42626bc56b794d94d084ad0406d48605bdd45dd3b55c3bcd7dc3015c52388e01e691d591073e3a022efdf6e339c64f2cf794d96ef3acb4039db832c688fbd9103a9ca73820f95246c515651a254984c0435e2465c5a6be29d0fe2848b148e73c98b6b7665cbc80711dfeb71354c21de6a070fd4f8824b07ca55ae7a00"/230], 0x38) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 03:52:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000006453b4", 0x33fe0}], 0x1}, 0x0) 03:52:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x8}, 0x0) [ 2486.143305] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:52:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x9}, 0x0) 03:52:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000602590000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6000000}, 0x0) 03:52:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = dup3(r0, r1, 0x180000) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000000c0)={0xa01, 0x1, 0x8e, 0x4}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003900)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000002440), 0x3ffffffffffff67, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x4e24, @local}}) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="640000002400010f00"/20, @ANYRES32=r5, @ANYBLOB="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"], 0x64}}, 0x0) [ 2487.426512] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2487.620081] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xa}, 0x0) 03:52:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000007e53b4", 0x33fe0}], 0x1}, 0x0) [ 2488.570948] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2488.654480] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2489.332419] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2489.355684] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2489.364311] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x379, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x7000000}, 0x0) 03:52:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xb}, 0x0) 03:52:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x9f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600600000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2489.561924] kauditd_printk_skb: 101 callbacks suppressed [ 2489.561936] audit: type=1400 audit(2000001176.120:3471): avc: denied { map } for pid=5101 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000008153b4", 0x33fe0}], 0x1}, 0x0) 03:52:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xe}, 0x0) [ 2489.759788] audit: type=1400 audit(2000001176.140:3472): avc: denied { create } for pid=5119 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2489.977501] audit: type=1400 audit(2000001176.150:3473): avc: denied { create } for pid=5119 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2490.164627] audit: type=1400 audit(2000001176.170:3474): avc: denied { map } for pid=5101 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:56 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) fallocate(r0, 0x42, 0x0, 0x84003ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xe) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x2, 0x3) syz_genetlink_get_family_id$team(0x0) r3 = syz_open_procfs(0x0, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') r5 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000008c0)={@local}, &(0x7f0000000900)=0x14) socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) [ 2490.359102] audit: type=1400 audit(2000001176.180:3476): avc: denied { map } for pid=5101 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2490.546026] audit: type=1400 audit(2000001176.180:3475): avc: denied { create } for pid=5117 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:52:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x8000000}, 0x0) [ 2490.742238] audit: type=1400 audit(2000001176.200:3477): avc: denied { map } for pid=5101 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:52:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xf}, 0x0) [ 2490.885252] audit: type=1400 audit(2000001176.240:3478): avc: denied { map } for pid=5101 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2490.958530] audit: type=1400 audit(2000001176.300:3479): avc: denied { map } for pid=5101 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2491.059850] audit: type=1400 audit(2000001176.300:3480): avc: denied { map } for pid=5101 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2491.214687] protocol 88fb is buggy, dev hsr_slave_0 [ 2491.220168] protocol 88fb is buggy, dev hsr_slave_1 [ 2491.374633] protocol 88fb is buggy, dev hsr_slave_0 [ 2491.379939] protocol 88fb is buggy, dev hsr_slave_1 [ 2491.385275] protocol 88fb is buggy, dev hsr_slave_0 [ 2491.390372] protocol 88fb is buggy, dev hsr_slave_1 [ 2491.395615] protocol 88fb is buggy, dev hsr_slave_0 [ 2491.400704] protocol 88fb is buggy, dev hsr_slave_1 [ 2491.405904] protocol 88fb is buggy, dev hsr_slave_0 [ 2491.410995] protocol 88fb is buggy, dev hsr_slave_1 03:52:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x10}, 0x0) 03:52:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x9000000}, 0x0) [ 2492.056025] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2492.064932] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2492.073674] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:52:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x37a, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:52:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x60}, 0x0) 03:52:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600680000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:52:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000038e53b4", 0x33fe0}], 0x1}, 0x0) 03:52:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xa000000}, 0x0) 03:52:59 executing program 3: r0 = perf_event_open(&(0x7f0000000780)={0xac3bb97ad55d8543, 0x7e, 0x2, 0x2, 0x3, 0x0, 0x0, 0x7, 0x10000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x570bbd79, 0x9, @perf_bp={&(0x7f00000005c0), 0x4}, 0x2, 0xaa1, 0x7, 0x2, 0x1ff, 0x9, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000800)={0x0, 0xfffffffffffffc89, 0x3f, 0x0, 0xff, 0xca, 0x0, 0x800000002, 0x0, 0x4, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000, 0x800}, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0x9, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgboup/\x1a\x85\xdc\xb0|\x03>@\x7f\x85\xe6\xfb\'\xc5\x96', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000400)='syz\xb1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000500)='cpu.stat\x00', 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'batadv0\x00'}}, 0x80, 0x0}, 0x5000040) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r4, &(0x7f0000000440)='threaded\x00', 0x38b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, @perf_bp={&(0x7f0000000080)}, 0x0, 0x300}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000480)=ANY=[]) socketpair(0x15, 0x3, 0x1, &(0x7f0000000140)) gettid() getpid() perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0xccd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580), 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 2493.770148] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:53:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006006c0000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xf0}, 0x0) [ 2493.840841] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000003d853b4", 0x33fe0}], 0x1}, 0x0) 03:53:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xb000000}, 0x0) [ 2494.607008] kauditd_printk_skb: 170 callbacks suppressed [ 2494.607020] audit: type=1400 audit(2000001181.170:3651): avc: denied { map } for pid=5766 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x500}, 0x0) [ 2494.779555] audit: type=1400 audit(2000001181.170:3652): avc: denied { map } for pid=5766 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2494.911015] audit: type=1400 audit(2000001181.200:3653): avc: denied { map } for pid=5731 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2495.079573] audit: type=1400 audit(2000001181.210:3654): avc: denied { map } for pid=5731 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2495.221658] audit: type=1400 audit(2000001181.210:3656): avc: denied { map } for pid=5766 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2495.358453] audit: type=1400 audit(2000001181.220:3657): avc: denied { map } for pid=5766 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2495.453649] audit: type=1400 audit(2000001181.210:3655): avc: denied { create } for pid=5760 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:53:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x600}, 0x0) [ 2495.518271] audit: type=1400 audit(2000001181.220:3658): avc: denied { map } for pid=5767 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2495.561195] audit: type=1400 audit(2000001181.230:3659): avc: denied { map } for pid=5767 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2495.596201] audit: type=1400 audit(2000001181.240:3660): avc: denied { write } for pid=5760 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2495.728204] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x37b, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf000000}, 0x0) [ 2496.485638] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2496.507109] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:03 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f00000000c0)=0x6c, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x66, &(0x7f0000000180)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @remote, @mcast1, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0xf, 0x6, '\x00', 0x0, 0x0, 0x0, @empty, @ipv4={[], [], @rand_addr=0x4}}}}}}}}, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000280)=""/192, 0xc0}, {&(0x7f0000000340)=""/81, 0x51}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/43, 0x2b}, {&(0x7f0000001400)=""/170, 0xaa}, {&(0x7f00000014c0)=""/169, 0xa9}, {&(0x7f0000001580)=""/33, 0x21}, {&(0x7f00000015c0)=""/216, 0xd8}, {&(0x7f00000016c0)=""/38, 0x26}], 0x9}, 0x8}, {{&(0x7f00000017c0)=@caif=@rfm, 0x80, &(0x7f0000002000)=[{&(0x7f0000001840)=""/14, 0xe}, {&(0x7f0000001880)=""/98, 0x62}, {&(0x7f0000001900)=""/149, 0x95}, {&(0x7f00000019c0)=""/221, 0xdd}, {&(0x7f0000001ac0)=""/222, 0xde}, {&(0x7f0000001bc0)=""/237, 0xed}, {&(0x7f0000001cc0)=""/232, 0xe8}, {&(0x7f0000001dc0)=""/120, 0x78}, {&(0x7f0000001e40)=""/254, 0xfe}, {&(0x7f0000001f40)=""/140, 0x8c}], 0xa}, 0x10000}, {{0x0, 0x0, &(0x7f0000003100)=[{&(0x7f00000020c0)=""/3, 0x3}, {&(0x7f0000002100)=""/4096, 0x1000}], 0x2}, 0x4800}, {{&(0x7f0000003140)=@ll, 0x80, &(0x7f00000033c0)=[{&(0x7f00000031c0)=""/73, 0x49}, {&(0x7f0000003240)=""/1, 0x1}, {&(0x7f0000003280)=""/146, 0x92}, {&(0x7f0000003340)=""/123, 0x7b}], 0x4, &(0x7f0000003400)=""/121, 0x79}, 0xd87d}, {{&(0x7f0000003480)=@xdp, 0x80, &(0x7f0000003540)=[{&(0x7f0000003500)=""/59, 0x3b}], 0x1, &(0x7f0000003580)=""/191, 0xbf}, 0x6}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003640)=""/125, 0x7d}, {&(0x7f00000036c0)=""/6, 0x6}, {&(0x7f0000003700)=""/166, 0xa6}], 0x3, &(0x7f0000003800)=""/53, 0x35}, 0x5}], 0x6, 0x40000001, &(0x7f00000039c0)={0x77359400}) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="000002", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r8}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000003a00)={0x6ec6, 0x9c0, 0x8000, 0x6, 0x9, 0x2, 0x1, 0x8000, r8}, &(0x7f0000003a40)=0x20) r9 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000040)) syz_kvm_setup_cpu$x86(r9, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r9, 0x4008ae6a, &(0x7f0000000100)={0x2, 0x0, [{0x76, 0x2, 0x0, 0x0, @msi={0xffff, 0x8, 0x42}}, {0x0, 0x0, 0x0, 0x0, @irqchip={0x7fffffff, 0xb5d}}]}) ioctl$NBD_SET_SIZE(r3, 0xab02, 0x9) 03:53:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600740000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x900}, 0x0) 03:53:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000fe353b4", 0x33fe0}], 0x1}, 0x0) [ 2497.178779] sctp: [Deprecated]: syz-executor.3 (pid 6015) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2497.178779] Use struct sctp_sack_info instead 03:53:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006007a0000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xa00}, 0x0) [ 2497.466053] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2497.530509] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000feb53b4", 0x33fe0}], 0x1}, 0x0) 03:53:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x10000000}, 0x0) 03:53:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xb00}, 0x0) [ 2498.558091] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2498.576314] sctp: [Deprecated]: syz-executor.3 (pid 6001) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2498.576314] Use struct sctp_sack_info instead 03:53:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x20000000}, 0x0) [ 2499.614788] kauditd_printk_skb: 138 callbacks suppressed [ 2499.614802] audit: type=1400 audit(2000001186.170:3799): avc: denied { create } for pid=6309 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2499.749524] audit: type=1400 audit(2000001186.310:3800): avc: denied { map } for pid=6364 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2499.815227] audit: type=1400 audit(2000001186.310:3801): avc: denied { map } for pid=6364 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2499.847150] audit: type=1400 audit(2000001186.330:3802): avc: denied { map } for pid=6364 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2499.880993] audit: type=1400 audit(2000001186.330:3803): avc: denied { map } for pid=6364 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2499.914682] audit: type=1400 audit(2000001186.340:3804): avc: denied { map } for pid=6364 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2499.958182] audit: type=1400 audit(2000001186.360:3805): avc: denied { map } for pid=6364 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2499.994964] audit: type=1400 audit(2000001186.360:3806): avc: denied { map } for pid=6364 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2500.020461] audit: type=1400 audit(2000001186.380:3807): avc: denied { map } for pid=6364 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2500.045201] audit: type=1400 audit(2000001186.380:3808): avc: denied { map } for pid=6364 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x37c, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x48000000}, 0x0) 03:53:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xe00}, 0x0) [ 2500.195956] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2500.204689] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2500.214805] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:06 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysfs$3(0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'veth1\x00'}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_IFALIAS={0x14, 0x14, 'veth1_to_bond\x00'}]}, 0x3c}}, 0x0) 03:53:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000ff353b4", 0x33fe0}], 0x1}, 0x0) 03:53:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600f00000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xf00}, 0x0) [ 2500.921658] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x4c000000}, 0x0) 03:53:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x217e}, 0x0) [ 2501.529699] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2501.545826] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2501.573414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2501.582773] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 03:53:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x3f00}, 0x0) [ 2501.679183] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2501.709616] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2501.762365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2501.790934] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 03:53:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x60000000}, 0x0) 03:53:08 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0xa05}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x4) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) fchown(r0, r2, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000200)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f000095dffc)=0xfffffffffffffcac) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000180), 0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0xa6, "6716aebbac4c75754be83bf18efbc3d67c0e8ab0838e16fa92ae96fc34473970ce5ea212d8ba4349ab4d2018508f2f635bcf8595dca10d985d06743f993e41cb516c340e4100fb62594ba4b519c63ba0c75a43ea5da995ce1d24c6800c6353d2dade240c53370dc62ce0bbfde105c82d174cbfac554d2ca1db6c5ce40533a49776c07bc7f00099f809fe8c8f33fd2302a1a97cb1f8d2f0e4d8e0e23b805d089b2d131ae00063"}, &(0x7f0000000180)=0xae) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(0xffffffffffffffff, 0x0) unshare(0x40000000) r7 = dup3(r6, 0xffffffffffffffff, 0x100000) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="000002", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r10}, 0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000080)={r10, 0xfff}, 0x8) r11 = accept(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x8000, 0x0) write$binfmt_elf64(r11, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xcec}, [{0x0, 0x0, 0xfff}], "", [[], [], []]}, 0x378) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2502.633699] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2502.667275] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2502.720051] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2502.932294] IPVS: ftp: loaded support on port[0] = 21 [ 2503.226302] sctp: [Deprecated]: syz-executor.3 (pid 6820) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2503.226302] Use struct sctp_sack_info instead [ 2503.823627] IPVS: ftp: loaded support on port[0] = 21 [ 2503.882134] sctp: [Deprecated]: syz-executor.3 (pid 6872) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2503.882134] Use struct sctp_sack_info instead 03:53:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x37d, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x68000000}, 0x0) 03:53:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x4000}, 0x0) 03:53:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006b03f0300010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010002000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x6000}, 0x0) [ 2504.254051] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2504.286200] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2504.296917] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010003000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600400300010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2504.651113] kauditd_printk_skb: 107 callbacks suppressed [ 2504.651128] audit: type=1400 audit(2000001191.210:3916): avc: denied { map } for pid=6935 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2504.811760] audit: type=1400 audit(2000001191.280:3917): avc: denied { map } for pid=6935 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2504.837040] audit: type=1400 audit(2000001191.280:3918): avc: denied { map } for pid=6935 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2504.863564] audit: type=1400 audit(2000001191.330:3919): avc: denied { map } for pid=6935 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2504.974009] audit: type=1400 audit(2000001191.340:3920): avc: denied { map } for pid=6935 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6b6b6b00}, 0x0) [ 2505.176318] audit: type=1400 audit(2000001191.460:3921): avc: denied { map } for pid=6935 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x7e21}, 0x0) [ 2505.344614] audit: type=1400 audit(2000001191.460:3922): avc: denied { map } for pid=6935 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2505.458660] audit: type=1400 audit(2000001191.470:3923): avc: denied { map } for pid=6982 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2505.553160] audit: type=1400 audit(2000001191.470:3924): avc: denied { map } for pid=6982 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2505.622304] audit: type=1400 audit(2000001191.490:3925): avc: denied { map } for pid=6982 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xf000}, 0x0) [ 2506.780876] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2506.804968] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2506.815139] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:15 executing program 3: 03:53:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6c000000}, 0x0) 03:53:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x33fb0}, 0x0) 03:53:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600034000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010004000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x37e, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x34000}, 0x0) 03:53:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x74000000}, 0x0) 03:53:16 executing program 3: 03:53:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x400300}, 0x0) [ 2510.215625] kauditd_printk_skb: 91 callbacks suppressed [ 2510.215639] audit: type=1400 audit(2000001196.780:4017): avc: denied { create } for pid=7218 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2510.425916] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2510.433416] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:53:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x37f, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2510.475015] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006fffff000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:17 executing program 3: [ 2510.639969] audit: type=1400 audit(2000001197.200:4018): avc: denied { create } for pid=7374 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:53:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010005000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xf0ffff}, 0x0) [ 2510.770999] audit: type=1400 audit(2000001197.200:4019): avc: denied { create } for pid=7445 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2510.875963] audit: type=1400 audit(2000001197.200:4020): avc: denied { map } for pid=7403 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x7a000000}, 0x0) [ 2510.996072] audit: type=1400 audit(2000001197.200:4021): avc: denied { map } for pid=7403 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2511.121859] audit: type=1400 audit(2000001197.200:4022): avc: denied { map } for pid=7403 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2511.234797] audit: type=1400 audit(2000001197.200:4023): avc: denied { map } for pid=7403 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:17 executing program 3: [ 2511.382428] audit: type=1400 audit(2000001197.230:4024): avc: denied { create } for pid=7445 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2511.517988] audit: type=1400 audit(2000001197.290:4025): avc: denied { map } for pid=7403 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2511.693434] audit: type=1400 audit(2000001197.310:4026): avc: denied { map } for pid=7403 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x1000000}, 0x0) 03:53:18 executing program 3: 03:53:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x9effffff}, 0x0) [ 2512.489914] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2512.530332] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2512.566664] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x2000000}, 0x0) 03:53:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000001010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2513.674599] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2513.798123] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x380, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:20 executing program 3: 03:53:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf0ffffff}, 0x0) 03:53:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x4000000}, 0x0) 03:53:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010006000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000002010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2514.183187] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2514.209290] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 03:53:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x5000000}, 0x0) 03:53:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010007000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf22c0000}, 0x0) 03:53:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x6000000}, 0x0) [ 2515.226956] kauditd_printk_skb: 151 callbacks suppressed [ 2515.226971] audit: type=1400 audit(2000001201.790:4178): avc: denied { map } for pid=8044 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() r1 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/context\x00', 0x2, 0x0) write(r1, &(0x7f0000000100)="76d526a4f71fea9db3da3af11244bf8b60bfe2e9b8b03a1098e81b7eff0adb811fd94f07707083870873cb4be3c0088ea9b324", 0x33) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_POLL(r3, &(0x7f0000000000)={0x18, 0xfffffffffffffff5, 0x1, {0x7}}, 0x18) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r6, 0x407, 0x2) write(r4, &(0x7f0000000340), 0x41395527) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2515.382910] audit: type=1400 audit(2000001201.790:4179): avc: denied { create } for pid=8050 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2515.491863] audit: type=1400 audit(2000001201.790:4180): avc: denied { write } for pid=8050 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2515.583211] audit: type=1400 audit(2000001201.820:4181): avc: denied { map } for pid=8044 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2515.632149] audit: type=1400 audit(2000001202.080:4183): avc: denied { create } for pid=7986 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2515.739744] audit: type=1400 audit(2000001202.080:4184): avc: denied { write } for pid=7986 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2515.834360] audit: type=1400 audit(2000001202.060:4182): avc: denied { create } for pid=7992 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2515.927655] audit: type=1400 audit(2000001202.100:4185): avc: denied { write } for pid=7992 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2516.116044] audit: type=1400 audit(2000001202.240:4186): avc: denied { create } for pid=8055 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2516.146097] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2516.174216] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2516.227216] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2516.254125] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2516.274263] audit: type=1400 audit(2000001202.250:4187): avc: denied { create } for pid=8053 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:53:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x381, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:53:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf6ffffff}, 0x0) 03:53:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000003010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x8000000}, 0x0) 03:53:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010008000153b4", 0x33fe0}], 0x1}, 0x0) [ 2517.609179] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x9000000}, 0x0) [ 2517.721573] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2517.792149] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000004010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xf, 0x800, 0x3}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001180)={r3, &(0x7f0000000040), &(0x7f00000021c0)=""/4096}, 0x18) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_inet_SIOCGARP(r5, 0x8954, &(0x7f0000000140)={{0x2, 0x4e23, @loopback}, {0x6, @random="f751fd34b17c"}, 0x32, {0x2, 0x4e20, @empty}, 'vcan0\x00'}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty, 0x5}, 0x1c) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2517.906542] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2517.995780] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010009000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xfffff000}, 0x0) 03:53:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xa000000}, 0x0) [ 2520.107171] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2520.140827] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2520.225599] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2520.516756] kauditd_printk_skb: 120 callbacks suppressed [ 2520.516770] audit: type=1400 audit(2000001207.080:4308): avc: denied { map } for pid=8632 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2520.570703] audit: type=1400 audit(2000001207.080:4309): avc: denied { map } for pid=8632 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2520.614086] audit: type=1400 audit(2000001207.080:4310): avc: denied { map } for pid=8632 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2520.647938] audit: type=1400 audit(2000001207.080:4311): avc: denied { map } for pid=8632 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2520.715430] audit: type=1400 audit(2000001207.100:4312): avc: denied { map } for pid=8632 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2520.910329] audit: type=1400 audit(2000001207.120:4313): avc: denied { map } for pid=8632 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2520.943725] audit: type=1400 audit(2000001207.120:4314): avc: denied { map } for pid=8632 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2520.987428] audit: type=1400 audit(2000001207.180:4315): avc: denied { map } for pid=8632 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2521.039439] audit: type=1400 audit(2000001207.180:4316): avc: denied { map } for pid=8632 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2521.090954] audit: type=1400 audit(2000001207.200:4317): avc: denied { map } for pid=8632 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x382, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000fed000/0x1000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x8, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x140, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000400)=0x100, &(0x7f0000000440)=0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x521500, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000200)={0x3, 0x0, [{0x6, 0x3144, 0xd9, 0x170, 0x5}, {0x80000019, 0x9f5, 0x9, 0x2, 0x5c}, {0xb, 0xf08, 0x1ff, 0x0, 0x40}]}) fcntl$notify(0xffffffffffffffff, 0x402, 0x40000000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syncfs(r2) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0xfffffffffffffffe) umount2(&(0x7f0000000540)='./file0\x00', 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSETAF(r6, 0x5408, &(0x7f00000000c0)={0x81, 0x811, 0x5, 0xffff, 0xd, 0x7f, 0xe0, 0x28, 0x1000, 0x81}) 03:53:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xffffff7f}, 0x0) 03:53:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000005010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000a000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xb000000}, 0x0) [ 2521.302716] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2521.404198] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000b000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xe000000}, 0x0) [ 2521.790125] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000006010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xffffff9e}, 0x0) 03:53:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xf000000}, 0x0) 03:53:29 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) io_setup(0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) sendfile(r1, r0, 0x0, 0xc0000008000000b) syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') r2 = creat(0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xc0000008000000b) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) r6 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000180)={r7}, 0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=r7], &(0x7f0000000180)=0x1) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0xa085, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') r10 = creat(&(0x7f0000000080)='./file0\x00', 0x0) sendfile(r10, r9, 0x0, 0xc0000008000000b) ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, &(0x7f00000000c0)) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r10, 0x28, 0x2, &(0x7f0000000080)=0x6c5, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 2523.441966] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2523.598840] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2523.976514] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x383, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000e000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x10000000}, 0x0) 03:53:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000007010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xfffffff0}, 0x0) 03:53:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x90000, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000000040)) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x0, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) socket$alg(0x26, 0x5, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:53:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x3f000000}, 0x0) [ 2525.481052] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2525.540238] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2525.571756] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000008010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2525.660668] kauditd_printk_skb: 163 callbacks suppressed [ 2525.660683] audit: type=1400 audit(2000001212.220:4481): avc: denied { create } for pid=8998 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:53:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000f000153b4", 0x33fe0}], 0x1}, 0x0) [ 2525.835828] audit: type=1400 audit(2000001212.260:4482): avc: denied { create } for pid=8996 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:53:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x401) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f0000000080)={0x9, 0x1}) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0xb) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f00000002c0)={0x7, 0x80, [{0x6, 0x0, 0x9d}, {0x3, 0x0, 0x71f3}, {0x6, 0x0, 0x80000000}, {0xfffffffb, 0x0, 0xf6f}, {0x2, 0x0, 0x1}, {0x1, 0x0, 0x4}, {0x0, 0x0, 0xfffffffffffffffe}]}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000007d94b7ff6e9d62dce21c782d2c1bd7e4c2e3e5dc233eb70dd16006a9c5e80efd075c0da10ed6e083358f8bfbac63ff27c7a8d2a7bb2ecd5fb048a6d01602245a31cd0c36ebbe6ad8214889df6935c42e49cb10634a56ee67f7d4ae16239440226560729ecb53e1b03b35103649065b0cb3b1eb3314db0c8c13c0ced2be155a791c4a2c110ba1b975f9e6055d2dcad3ce46f03689482f193dc3c953e7b0d091639309aabff64e58275561684e5fa1e0cc28396c095d395"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000014c0)=ANY=[@ANYBLOB="840000001100010700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000fc8000000800010075333200580002001400050000004c1855802b4ef305cd000000000000000000000000000040000600300001000000040000000000000000000000007452a8b150672a63000000000000000000000000000000000013000000000000d77ba189c7460999d8f31a44af4c7a938966d5e87d55e05dae3332c116fa93f45e2ed1daf8f1b385ea9e53926c14099d657f2fdbb4c06e9b1c6879ec78032a19696a9c86a892fe382820c912faea69992c1c7a43edc8dc5cb3c032ea5d36b640f3ac003121caae6948ed8f4562cb5569dcc200519392b868c39701dc7862acb6ac19ec1a87354f01f97e"], 0x84}}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'ip_vti0\x00', r7}) setsockopt$inet_udp_int(r0, 0x11, 0xf0a7ebddc354ddbc, &(0x7f0000000440)=0x7, 0x4) r9 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x40801, 0x0) ioctl$MON_IOCQ_URB_LEN(r9, 0x9201) poll(&(0x7f00000000c0)=[{r2}], 0x1, 0x37) [ 2526.041643] audit: type=1400 audit(2000001212.320:4483): avc: denied { map } for pid=9045 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xfffffff6}, 0x0) [ 2526.175395] audit: type=1400 audit(2000001212.320:4484): avc: denied { map } for pid=9045 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x40000000}, 0x0) [ 2526.337272] audit: type=1400 audit(2000001212.320:4485): avc: denied { map } for pid=9045 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2526.480637] audit: type=1400 audit(2000001212.350:4486): avc: denied { map } for pid=9045 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2526.619568] audit: type=1400 audit(2000001212.390:4487): avc: denied { map } for pid=9045 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2526.731607] audit: type=1400 audit(2000001212.420:4488): avc: denied { create } for pid=9052 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2526.798805] audit: type=1400 audit(2000001212.440:4489): avc: denied { map } for pid=9045 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2526.971916] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2526.988098] audit: type=1400 audit(2000001212.450:4490): avc: denied { map } for pid=9045 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2527.267227] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2527.326877] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2527.417951] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2528.224321] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.3'. 03:53:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x384, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x40030000000000}, 0x0) 03:53:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x60000000}, 0x0) 03:53:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000009010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010010000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:35 executing program 3: socket$inet6(0xa, 0x0, 0x2000000000adb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$get_security(0x11, 0x0, 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x9f0cb815c710f706, 0xfa00, {0x3, 0x0}}, 0x15c) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x12, r0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x8, 0x2, 0x12, r0, 0x0) syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0xb6c, 0x23e240) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ac"], 0x1) [ 2529.237424] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2529.334818] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:53:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x7e210000}, 0x0) [ 2529.398198] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00060000000a010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010048000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:36 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) syncfs(r0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) pivot_root(0x0, &(0x7f0000000240)='./file0\x00') r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0x4}}}]}, 0x38}}, 0x0) pipe2$9p(0x0, 0x0) dup(0xffffffffffffffff) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000180)={0x2}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x26f) accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000200)) uname(&(0x7f0000000280)=""/116) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@uname={'uname', 0x3d, 'trans=fd,'}}]}}) 03:53:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6b6b6b00000000}, 0x0) 03:53:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x9effffff}, 0x0) [ 2530.619062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14456 sclass=netlink_route_socket pig=9477 comm=syz-executor.3 [ 2530.694766] kauditd_printk_skb: 137 callbacks suppressed [ 2530.694778] audit: type=1400 audit(2000001217.250:4628): avc: denied { create } for pid=9438 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2530.792049] audit: type=1400 audit(2000001217.260:4629): avc: denied { create } for pid=9479 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2530.934812] audit: type=1400 audit(2000001217.300:4630): avc: denied { ioctl } for pid=9479 comm="syz-executor.5" path="socket:[518040]" dev="sockfs" ino=518040 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2531.054267] audit: type=1400 audit(2000001217.300:4631): avc: denied { write } for pid=9438 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2531.102343] audit: type=1400 audit(2000001217.310:4632): avc: denied { create } for pid=9479 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2531.217522] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2531.241349] audit: type=1400 audit(2000001217.570:4633): avc: denied { create } for pid=9471 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2531.290714] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2531.380263] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2531.414810] audit: type=1400 audit(2000001217.790:4634): avc: denied { create } for pid=9480 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2531.645182] audit: type=1400 audit(2000001217.790:4635): avc: denied { create } for pid=9480 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2531.833138] audit: type=1400 audit(2000001218.390:4636): avc: denied { map } for pid=9692 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2531.876171] audit: type=1400 audit(2000001218.420:4637): avc: denied { map } for pid=9692 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x385, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xb03f0300}, 0x0) 03:53:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 03:53:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00060000000b010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001004c000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff770000000000200000f0ffffff7f00000000a4000000000000000000", 0xffffffe5}], 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000080)='\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r4, 0x0, 0xedc0) 03:53:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xf0ffffff}, 0x0) [ 2533.250106] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2533.268911] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2533.284995] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc60}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) 03:53:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010060000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00060000000e010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x100000000000000}, 0x0) 03:53:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xfffff000}, 0x0) [ 2535.939420] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2535.975867] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x386, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2536.021954] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x200000000000000}, 0x0) 03:53:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xffffff7f}, 0x0) 03:53:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010068000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00060000000f010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2536.252989] kauditd_printk_skb: 109 callbacks suppressed [ 2536.253003] audit: type=1400 audit(2000001222.810:4747): avc: denied { create } for pid=10039 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:53:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xffffff9e}, 0x0) [ 2536.392632] audit: type=1400 audit(2000001222.850:4748): avc: denied { create } for pid=10040 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2536.554889] audit: type=1400 audit(2000001222.870:4749): avc: denied { create } for pid=10040 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2536.703060] audit: type=1400 audit(2000001223.140:4750): avc: denied { map } for pid=10073 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2536.836375] audit: type=1400 audit(2000001223.150:4751): avc: denied { map } for pid=10073 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x300000000000000}, 0x0) [ 2536.980487] audit: type=1400 audit(2000001223.180:4752): avc: denied { map } for pid=10073 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2537.114926] audit: type=1400 audit(2000001223.190:4753): avc: denied { map } for pid=10073 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xfffffff0}, 0x0) [ 2537.282799] audit: type=1400 audit(2000001223.240:4754): avc: denied { map } for pid=10073 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2537.442220] audit: type=1400 audit(2000001223.290:4755): avc: denied { map } for pid=10073 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2537.609572] audit: type=1400 audit(2000001223.300:4756): avc: denied { map } for pid=10073 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2537.978755] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2538.003648] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2538.040822] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x400000000000000}, 0x0) 03:53:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000010010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001006c000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x40030000000000}, 0x0) [ 2539.411963] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2539.445782] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2539.454294] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x387, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x500000000000000}, 0x0) 03:53:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 03:53:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000020010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010074000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x100000000000000}, 0x0) 03:53:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x600000000000000}, 0x0) 03:53:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x200000000000000}, 0x0) [ 2541.092630] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000040010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x400000000000000}, 0x0) 03:53:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x700000000000000}, 0x0) [ 2541.761710] kauditd_printk_skb: 123 callbacks suppressed [ 2541.761725] audit: type=1400 audit(2000001227.950:4880): avc: denied { create } for pid=10736 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2541.798952] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2541.838087] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2541.910918] audit: type=1400 audit(2000001227.970:4881): avc: denied { create } for pid=10736 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:53:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001007a000153b4", 0x33fe0}], 0x1}, 0x0) [ 2542.092342] audit: type=1400 audit(2000001228.020:4882): avc: denied { create } for pid=10617 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2542.226297] audit: type=1400 audit(2000001228.620:4883): avc: denied { map } for pid=10828 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2542.339917] audit: type=1400 audit(2000001228.660:4884): avc: denied { map } for pid=10828 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2542.509155] audit: type=1400 audit(2000001228.670:4885): avc: denied { map } for pid=10828 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2542.637249] audit: type=1400 audit(2000001228.670:4886): avc: denied { map } for pid=10828 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2542.768093] audit: type=1400 audit(2000001228.740:4887): avc: denied { map } for pid=10828 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2542.906601] audit: type=1400 audit(2000001228.760:4888): avc: denied { create } for pid=10830 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2543.003478] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2543.050855] audit: type=1400 audit(2000001228.770:4889): avc: denied { map } for pid=10828 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2543.146593] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2543.224367] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x388, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2543.321983] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x500000000000000}, 0x0) 03:53:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x800000000000000}, 0x0) 03:53:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100f0000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000048010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x600000000000000}, 0x0) 03:53:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x900000000000000}, 0x0) 03:53:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x800000000000000}, 0x0) [ 2545.177810] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2545.250935] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2545.337919] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00060000004c010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:52 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0xe5adf3dab25a25bd, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x1, 0x0, 0x10000, 0x8000}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x3, 0x4000) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$FUSE_NOTIFY_INVAL_INODE(r6, &(0x7f00000002c0)={0x28, 0x2, 0x0, {0x4, 0x8, 0x6}}, 0x28) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r4, 0x800443d2, &(0x7f0000000280)={0x4, &(0x7f0000000200)=[{}, {}, {}, {}]}) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000100)={r1, 0x3f}) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e099, 0x0, 0x31, 0xffffffffffffffff, 0x0) 03:53:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000030153b4", 0x33fe0}], 0x1}, 0x0) 03:53:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x900000000000000}, 0x0) [ 2546.276528] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x389, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xa00000000000000}, 0x0) 03:53:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001007a000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000259010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2546.867869] kauditd_printk_skb: 104 callbacks suppressed [ 2546.867883] audit: type=1400 audit(2000001233.430:4994): avc: denied { create } for pid=11272 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:53:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xa00000000000000}, 0x0) [ 2547.033831] audit: type=1400 audit(2000001233.470:4995): avc: denied { create } for pid=11269 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2547.086779] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 2547.135297] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2547.168840] audit: type=1400 audit(2000001233.550:4996): avc: denied { create } for pid=11333 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:53:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000050153b4", 0x33fe0}], 0x1}, 0x0) [ 2547.314673] audit: type=1400 audit(2000001233.550:4997): avc: denied { map } for pid=11300 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x13, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="8500000008020000004cea9f87f8d713270403d098170000008900"/37], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x275, &(0x7f0000000200)=""/207}, 0x48) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3, 0x400) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)={{r1, r2/1000+30000}, {r3, r4/1000+10000}}) [ 2547.371321] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2547.424694] audit: type=1400 audit(2000001233.570:4998): avc: denied { map } for pid=11300 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000060010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2547.583738] audit: type=1400 audit(2000001233.570:4999): avc: denied { map } for pid=11300 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2547.765969] audit: type=1400 audit(2000001233.580:5000): avc: denied { ioctl } for pid=11333 comm="syz-executor.5" path="socket:[518999]" dev="sockfs" ino=518999 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:53:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xb00000000000000}, 0x0) [ 2547.979538] audit: type=1400 audit(2000001233.590:5001): avc: denied { map } for pid=11300 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:53:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xb00000000000000}, 0x0) [ 2548.146791] audit: type=1400 audit(2000001233.590:5002): avc: denied { create } for pid=11333 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:53:54 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0xc, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000000)=0x2) syz_open_dev$usbfs(0x0, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 2548.318410] audit: type=1400 audit(2000001233.590:5003): avc: denied { create } for pid=11332 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:53:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xe00000000000000}, 0x0) [ 2548.948454] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2548.994662] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:53:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x38a, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:53:56 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0180c2000000ffffffff4dffff86dd1e00fe8000000000ff0200000000000000000000000000010200907800000000609433df00003a90a6564e6d671ac30000000000000000bbfe880000000000000000000000000001800000e77f000400"], 0x0) 03:53:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf00000000000000}, 0x0) 03:53:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xf00000000000000}, 0x0) [ 2549.762862] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:53:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000060153b4", 0x33fe0}], 0x1}, 0x0) 03:53:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000068010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:53:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x1000000000000000}, 0x0) 03:53:57 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x581, 0x2000) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f00000001c0)=ANY=[@ANYBLOB]) getdents64(r0, &(0x7f0000000740)=""/76, 0x4c) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$KVM_ASSIGN_SET_MSIX_NR(r3, 0x4008ae73, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e22, 0x7fff, @empty, 0x4}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e20, 0x1, @local, 0xfff}, @in6={0xa, 0x4e21, 0x80, @dev={0xfe, 0x80, [], 0x1c}, 0x9a}], 0x84) fcntl$setpipe(r0, 0x407, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0xffffffffffffffff) 03:53:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x1000000000000000}, 0x0) 03:53:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x3f00000000000000}, 0x0) 03:53:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x2000000000000000}, 0x0) 03:53:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) write$P9_RGETLOCK(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="270000003702000306000000000000000400000000000000", @ANYRES32=0x0, @ANYBLOB='\t\x00Puev/kvm\x00'], 0x27) r5 = dup(r0) read(r4, &(0x7f0000000080)=""/32, 0x20) syz_kvm_setup_cpu$x86(r5, r3, &(0x7f0000034000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x338) [ 2551.929846] kauditd_printk_skb: 149 callbacks suppressed [ 2551.929858] audit: type=1400 audit(2000001238.490:5153): avc: denied { create } for pid=12055 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2551.996295] audit: type=1400 audit(2000001238.560:5154): avc: denied { create } for pid=12055 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2552.154877] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2552.163496] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2552.236358] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2552.359092] audit: type=1400 audit(2000001238.920:5155): avc: denied { create } for pid=12059 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2552.457209] audit: type=1400 audit(2000001238.960:5156): avc: denied { ioctl } for pid=12059 comm="syz-executor.5" path="socket:[519725]" dev="sockfs" ino=519725 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2552.710896] audit: type=1400 audit(2000001239.000:5157): avc: denied { map } for pid=12061 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2552.846673] audit: type=1400 audit(2000001239.000:5158): avc: denied { map } for pid=12061 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2552.989604] audit: type=1400 audit(2000001239.010:5159): avc: denied { map } for pid=12061 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2553.184663] audit: type=1400 audit(2000001239.010:5160): avc: denied { map } for pid=12061 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2553.374871] audit: type=1400 audit(2000001239.120:5161): avc: denied { map } for pid=12061 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2553.525638] audit: type=1400 audit(2000001239.130:5162): avc: denied { map } for pid=12061 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x38b, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:54:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000070153b4", 0x33fe0}], 0x1}, 0x0) 03:54:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x4000000000000000}, 0x0) 03:54:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00060000006c010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:00 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x202000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f0000000100)="66b9800000c00f326635000400000f300f060fae0c0f10130f06360fc75a002e0f239f64f30f7f02660f38f5b000000f01c5", 0x32}], 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:54:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x4800000000000000}, 0x0) [ 2554.064830] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2554.082976] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:54:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x6000000000000000}, 0x0) [ 2554.142203] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000074010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2554.269796] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2554.316738] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000090153b4", 0x33fe0}], 0x1}, 0x0) 03:54:01 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x200, 0x10000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10020300}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r3, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="55e9629df390023c5a1b3130467de442"}, @FOU_ATTR_PEER_V6={0x14, 0x9, @local}, @FOU_ATTR_AF={0x8, 0x2, 0xba7aaf98a132b9e3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24000180}, 0x40000) r5 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r5, &(0x7f0000000140)='^', 0x34000, 0xfc, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) 03:54:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x4c00000000000000}, 0x0) 03:54:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x7e21000000000000}, 0x0) [ 2555.428778] IPVS: ftp: loaded support on port[0] = 21 [ 2555.956381] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2556.020449] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2556.057098] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2556.931259] IPVS: ftp: loaded support on port[0] = 21 [ 2557.012386] kauditd_printk_skb: 100 callbacks suppressed [ 2557.012399] audit: type=1400 audit(2000001243.570:5263): avc: denied { map } for pid=12429 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2557.150109] audit: type=1400 audit(2000001243.620:5264): avc: denied { map } for pid=12429 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x38c, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:54:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6000000000000000}, 0x0) 03:54:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000a0153b4", 0x33fe0}], 0x1}, 0x0) 03:54:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00060000007a010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x8000000000000000}, 0x0) [ 2557.260463] audit: type=1400 audit(2000001243.640:5265): avc: denied { map } for pid=12429 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2557.440475] audit: type=1400 audit(2000001243.640:5266): avc: denied { map } for pid=12429 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2557.482211] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2557.564911] audit: type=1400 audit(2000001243.670:5267): avc: denied { map } for pid=12429 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2557.600028] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x9effffff00000000}, 0x0) [ 2557.679040] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2557.726958] audit: type=1400 audit(2000001243.700:5268): avc: denied { map } for pid=12429 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000b0153b4", 0x33fe0}], 0x1}, 0x0) [ 2557.877501] audit: type=1400 audit(2000001243.700:5269): avc: denied { map } for pid=12429 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006ffffff9e010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2558.019325] audit: type=1400 audit(2000001243.730:5270): avc: denied { map } for pid=12429 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2558.190033] audit: type=1400 audit(2000001243.750:5271): avc: denied { map } for pid=12429 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6800000000000000}, 0x0) [ 2558.342458] audit: type=1400 audit(2000001243.790:5272): avc: denied { map } for pid=12429 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:05 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x200, 0x10000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10020300}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r3, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="55e9629df390023c5a1b3130467de442"}, @FOU_ATTR_PEER_V6={0x14, 0x9, @local}, @FOU_ATTR_AF={0x8, 0x2, 0xba7aaf98a132b9e3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24000180}, 0x40000) r5 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r5, &(0x7f0000000140)='^', 0x34000, 0xfc, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) 03:54:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xb03f030000000000}, 0x0) [ 2559.288807] IPVS: ftp: loaded support on port[0] = 21 [ 2559.403644] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2559.487151] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2559.552563] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:54:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 03:54:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x38d, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:54:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000e0153b4", 0x33fe0}], 0x1}, 0x0) 03:54:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x6c00000000000000}, 0x0) 03:54:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600033fb0010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 2561.496740] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2561.595166] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xffffffff00000000}, 0x0) [ 2561.673297] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:54:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000f0153b4", 0x33fe0}], 0x1}, 0x0) 03:54:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006fffffff0010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x7400000000000000}, 0x0) [ 2562.348052] kauditd_printk_skb: 129 callbacks suppressed [ 2562.348066] audit: type=1400 audit(2000001248.910:5402): avc: denied { create } for pid=12899 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2562.511777] audit: type=1400 audit(2000001248.960:5403): avc: denied { map } for pid=12900 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2562.629505] audit: type=1400 audit(2000001248.960:5404): avc: denied { map } for pid=12900 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2562.749117] audit: type=1400 audit(2000001248.980:5405): avc: denied { create } for pid=12899 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2562.862740] audit: type=1400 audit(2000001249.010:5406): avc: denied { map } for pid=12900 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2562.979129] audit: type=1400 audit(2000001249.050:5407): avc: denied { map } for pid=12900 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2563.116463] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2563.172372] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2563.184983] audit: type=1400 audit(2000001249.070:5408): avc: denied { create } for pid=12901 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2563.278273] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2563.355476] audit: type=1400 audit(2000001249.100:5409): avc: denied { write } for pid=12901 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2563.503783] audit: type=1400 audit(2000001249.120:5410): avc: denied { map } for pid=12900 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2563.644799] audit: type=1400 audit(2000001249.130:5411): avc: denied { map } for pid=12900 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:13 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x200, 0x10000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10020300}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r3, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="55e9629df390023c5a1b3130467de442"}, @FOU_ATTR_PEER_V6={0x14, 0x9, @local}, @FOU_ATTR_AF={0x8, 0x2, 0xba7aaf98a132b9e3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24000180}, 0x40000) r5 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r5, &(0x7f0000000140)='^', 0x34000, 0xfc, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) 03:54:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000200153b4", 0x33fe0}], 0x1}, 0x0) 03:54:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0xfffffffffffff000}, 0x0) 03:54:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x7a00000000000000}, 0x0) 03:54:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600f0ffff010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x38e, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2566.785300] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:54:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2566.835954] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2566.883835] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001005d3c0153b4", 0x33fe0}], 0x1}, 0x0) [ 2567.255680] IPVS: ftp: loaded support on port[0] = 21 03:54:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x9effffff00000000}, 0x0) [ 2567.637650] kauditd_printk_skb: 79 callbacks suppressed [ 2567.637664] audit: type=1400 audit(2000001254.190:5491): avc: denied { create } for pid=13127 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:54:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2567.801669] audit: type=1400 audit(2000001254.200:5492): avc: denied { map } for pid=13239 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2567.893848] audit: type=1400 audit(2000001254.200:5493): avc: denied { map } for pid=13239 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2568.102219] audit: type=1400 audit(2000001254.200:5494): avc: denied { write } for pid=13127 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2568.245230] audit: type=1400 audit(2000001254.200:5495): avc: denied { map } for pid=13239 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2568.394463] audit: type=1400 audit(2000001254.230:5496): avc: denied { map } for pid=13239 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2568.534057] audit: type=1400 audit(2000001254.270:5497): avc: denied { create } for pid=13238 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:54:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) [ 2568.681202] audit: type=1400 audit(2000001254.280:5498): avc: denied { map } for pid=13239 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2568.816037] audit: type=1400 audit(2000001254.290:5499): avc: denied { create } for pid=13238 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:54:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x4}, 0x0) [ 2568.857653] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2569.002478] audit: type=1400 audit(2000001254.310:5500): avc: denied { map } for pid=13239 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2569.808498] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2569.825912] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2569.886065] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:54:16 executing program 3: 03:54:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x38f, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:54:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00067fffffff010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf22c000000000000}, 0x0) 03:54:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100003f0153b4", 0x33fe0}], 0x1}, 0x0) 03:54:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x5}, 0x0) [ 2570.290110] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2570.424754] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:54:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00069effffff010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:17 executing program 3: 03:54:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xf6ffffff00000000}, 0x0) 03:54:18 executing program 3: [ 2571.978913] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2572.029941] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2572.070587] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2572.092209] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:54:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000400153b4", 0x33fe0}], 0x1}, 0x0) 03:54:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x6}, 0x0) 03:54:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006f0ffffff010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2572.678614] kauditd_printk_skb: 108 callbacks suppressed [ 2572.678627] audit: type=1400 audit(2000001259.240:5609): avc: denied { write } for pid=13894 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2572.846859] audit: type=1400 audit(2000001259.370:5610): avc: denied { create } for pid=13895 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2573.026752] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2573.040178] audit: type=1400 audit(2000001259.450:5611): avc: denied { create } for pid=13897 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2573.086700] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x390, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:54:19 executing program 3: 03:54:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 2573.157654] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2573.255685] audit: type=1400 audit(2000001259.490:5612): avc: denied { write } for pid=13897 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:54:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000480153b4", 0x33fe0}], 0x1}, 0x0) 03:54:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000000001fffffff0153b4", 0x33fe0}], 0x1}, 0x0) [ 2573.495140] audit: type=1400 audit(2000001259.540:5613): avc: denied { map } for pid=13899 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x8}, 0x0) [ 2573.704597] audit: type=1400 audit(2000001259.560:5614): avc: denied { map } for pid=13899 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:20 executing program 3: [ 2573.860157] audit: type=1400 audit(2000001259.580:5615): avc: denied { map } for pid=13899 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2574.021415] audit: type=1400 audit(2000001259.630:5616): avc: denied { map } for pid=13899 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2574.251761] audit: type=1400 audit(2000001259.690:5617): avc: denied { map } for pid=13899 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:20 executing program 3: [ 2574.399536] audit: type=1400 audit(2000001259.750:5618): avc: denied { map } for pid=13899 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0xfffffffffffff000}, 0x0) [ 2575.010825] validate_nla: 2 callbacks suppressed [ 2575.010836] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:54:21 executing program 3: 03:54:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x391, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:54:22 executing program 3: [ 2575.845594] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2575.854302] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1}, 0x0) 03:54:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000004000000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2575.894884] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:54:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100004c0153b4", 0x33fe0}], 0x1}, 0x0) 03:54:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x9}, 0x0) 03:54:23 executing program 3: 03:54:23 executing program 3: 03:54:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 2577.376343] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:54:24 executing program 3: [ 2577.979415] kauditd_printk_skb: 126 callbacks suppressed [ 2577.979429] audit: type=1400 audit(2000001264.530:5745): avc: denied { create } for pid=14441 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2578.037757] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2578.059695] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:54:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600020000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2578.077359] audit: type=1400 audit(2000001264.640:5746): avc: denied { map } for pid=14409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2578.094907] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xa}, 0x0) [ 2578.172479] audit: type=1400 audit(2000001264.670:5747): avc: denied { map } for pid=14409 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2578.328120] audit: type=1400 audit(2000001264.680:5748): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2578.474969] audit: type=1400 audit(2000001264.690:5749): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2578.651979] audit: type=1400 audit(2000001264.760:5750): avc: denied { map } for pid=14409 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2578.828111] audit: type=1400 audit(2000001264.800:5751): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2578.943261] audit: type=1400 audit(2000001264.800:5752): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2579.100894] audit: type=1400 audit(2000001264.850:5753): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2579.289230] audit: type=1400 audit(2000001264.860:5754): avc: denied { map } for pid=14409 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2579.825930] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:54:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:54:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001003c5d0153b4", 0x33fe0}], 0x1}, 0x0) 03:54:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x3}, 0x0) 03:54:26 executing program 3: 03:54:26 executing program 3: 03:54:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600030000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2580.146527] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:54:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xb}, 0x0) [ 2580.288148] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2580.362288] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2580.409392] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2580.446142] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000600153b4", 0x33fe0}], 0x1}, 0x0) 03:54:27 executing program 3: 03:54:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x4}, 0x0) 03:54:28 executing program 3: [ 2582.083584] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2582.103128] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:54:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600040000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2583.019385] kauditd_printk_skb: 122 callbacks suppressed [ 2583.019398] audit: type=1400 audit(2000001269.580:5877): avc: denied { map } for pid=14861 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2583.167011] audit: type=1400 audit(2000001269.580:5878): avc: denied { map } for pid=14861 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2583.290274] audit: type=1400 audit(2000001269.800:5879): avc: denied { create } for pid=14923 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2583.347992] audit: type=1400 audit(2000001269.800:5880): avc: denied { write } for pid=14923 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2583.398905] audit: type=1400 audit(2000001269.810:5881): avc: denied { map } for pid=14925 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2583.444881] audit: type=1400 audit(2000001269.810:5882): avc: denied { map } for pid=14925 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2583.467845] audit: type=1400 audit(2000001269.820:5883): avc: denied { map } for pid=14925 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2583.505849] audit: type=1400 audit(2000001269.820:5884): avc: denied { map } for pid=14925 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2583.530313] audit: type=1400 audit(2000001269.830:5885): avc: denied { map } for pid=14925 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2583.553105] audit: type=1400 audit(2000001269.830:5886): avc: denied { map } for pid=14925 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2583.709022] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:54:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xe}, 0x0) 03:54:30 executing program 3: [ 2583.757616] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2583.775741] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:54:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x393, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2583.822418] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000680153b4", 0x33fe0}], 0x1}, 0x0) 03:54:30 executing program 3: [ 2583.885277] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2583.918611] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:54:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x5}, 0x0) 03:54:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600050000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xf}, 0x0) 03:54:31 executing program 3: 03:54:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x6}, 0x0) 03:54:31 executing program 3: r0 = socket$packet(0x11, 0x2000100000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x9}]}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) pipe(&(0x7f0000000080)) syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCTRL(r5, 0xc0445624, &(0x7f00000000c0)={0x9, 0x0, "bdc951b07cf290ee4aa855d04e40d8506078f2d23796d6c47e2889ee82b7e809", 0xc57, 0x5, 0x3ff, 0x1afd, 0x124}) splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) [ 2585.845886] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2585.883632] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2585.930684] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2585.958949] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:54:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100006c0153b4", 0x33fe0}], 0x1}, 0x0) 03:54:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600060000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2586.334691] net_ratelimit: 2 callbacks suppressed [ 2586.334700] protocol 88fb is buggy, dev hsr_slave_0 [ 2586.344797] protocol 88fb is buggy, dev hsr_slave_1 [ 2586.814626] protocol 88fb is buggy, dev hsr_slave_0 [ 2586.819836] protocol 88fb is buggy, dev hsr_slave_1 [ 2586.825163] protocol 88fb is buggy, dev hsr_slave_0 [ 2586.830344] protocol 88fb is buggy, dev hsr_slave_1 [ 2586.835523] protocol 88fb is buggy, dev hsr_slave_0 [ 2586.840606] protocol 88fb is buggy, dev hsr_slave_1 [ 2586.845909] protocol 88fb is buggy, dev hsr_slave_0 [ 2586.850999] protocol 88fb is buggy, dev hsr_slave_1 [ 2587.268515] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2587.302085] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x394, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2587.335731] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2587.350482] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:54:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x7}, 0x0) [ 2587.385364] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2587.417533] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2587.468369] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:54:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) sendmsg$nl_route(r0, &(0x7f0000003740)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@ipv4_newroute={0xe0, 0x18, 0xc3ae4bb514f57c84, 0x70bd26, 0x25dfdbff, {0x2, 0x20, 0x14, 0x7, 0xfc, 0x2, 0xfd, 0x1, 0x400}, [@RTA_PRIORITY={0x8, 0x6, 0x401}, @RTA_PREFSRC={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0xc}}, @RTA_PRIORITY={0x8, 0x6, 0x351cbba0}, @RTA_FLOW={0x8, 0xb, 0x5}, @RTA_ENCAP={0x90, 0x16, @generic="48a3a310f85d61fdb8d3f00f63bbc243dc01ff88f31e845aeb58eb2b8f169c65fd112ecfd43018c7d71357cd48ee887a64b1882e97dc64f1d0a3a068d74d1879e5109e673c5bd7a882a34b8de3eedd87d94d7602126e2e2049850717ac71ec394c61768a47f101f259832609134a3dbc6261523d26f679885039fe56479f93cac28023a97b48f58032"}, @RTA_IIF={0xfffffffffffffdff, 0x1, r1}, @RTA_ENCAP={0xc, 0x16, @typed={0x8, 0x1e, @uid=r3}}]}, 0xe0}}, 0x0) r4 = getgid() r5 = geteuid() stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$UFFDIO_API(r9, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x10}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) mount$9p_virtio(&(0x7f0000000040)='bond\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1082812, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=virtio,noextend,access=any,posixacl,access=client,version=9p2000.L,fscache,debug=0x0000000000000004,dfltgid=', @ANYRESHEX=r4, @ANYBLOB=',obj_user=bond\x00,fsmagic=0x00000000000000f3,euid=', @ANYRESDEC=r5, @ANYBLOB="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", @ANYRESDEC=r6, @ANYBLOB=',uid=', @ANYRESDEC=r10, @ANYBLOB=',\x00']) 03:54:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000740153b4", 0x33fe0}], 0x1}, 0x0) 03:54:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600070000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x60}, 0x0) [ 2588.031548] kauditd_printk_skb: 139 callbacks suppressed [ 2588.031561] audit: type=1400 audit(2000001274.590:6026): avc: denied { map } for pid=15281 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2588.119233] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2588.179282] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2588.215495] audit: type=1400 audit(2000001274.600:6027): avc: denied { create } for pid=15283 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2588.230595] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2588.310947] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2588.354373] audit: type=1400 audit(2000001274.660:6028): avc: denied { map } for pid=15281 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xf0}, 0x0) 03:54:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100007a0153b4", 0x33fe0}], 0x1}, 0x0) [ 2588.494734] audit: type=1400 audit(2000001274.670:6029): avc: denied { ioctl } for pid=15283 comm="syz-executor.5" path="socket:[521959]" dev="sockfs" ino=521959 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2588.705883] audit: type=1400 audit(2000001274.680:6030): avc: denied { write } for pid=15283 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2588.793287] audit: type=1400 audit(2000001274.700:6031): avc: denied { map } for pid=15281 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2588.900641] audit: type=1400 audit(2000001274.700:6032): avc: denied { map } for pid=15281 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2589.019313] audit: type=1400 audit(2000001274.700:6033): avc: denied { map } for pid=15287 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x8}, 0x0) 03:54:35 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @rand_addr="0b004000000080000000000000000009"}, 0x1c) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") syz_emit_ethernet(0x8a, &(0x7f0000000200)={@local, @random='\x00\x00\x00\x009\x00', [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @sack={0x5, 0x1e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @window={0x3, 0x3}, @exp_fastopen={0xfe, 0x5, 0xf989, "da"}, @md5sig={0x13, 0x12, "e19bdea16a577d8887b71f37fddbbb61"}]}}}}}}}}, 0x0) [ 2589.123645] audit: type=1400 audit(2000001274.710:6034): avc: denied { create } for pid=15284 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2589.277203] audit: type=1400 audit(2000001274.710:6035): avc: denied { map } for pid=15287 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x396, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:54:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600080000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2590.296197] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xcf}) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000080)=""/29, &(0x7f0000000140)=0x1d) 03:54:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000f00153b4", 0x33fe0}], 0x1}, 0x0) [ 2590.407013] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x500}, 0x0) 03:54:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x9}, 0x0) 03:54:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/135, &(0x7f0000000340)=0x16) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000004c0)="f21d8385fff33477", 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000940)}], 0x1}, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @local}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) write$P9_RSTATu(r5, &(0x7f0000000800)={0xa0, 0x7d, 0x1, {{0x0, 0x56, 0xab, 0x10000, {0x0, 0x3, 0x8}, 0x10000, 0x3f, 0x2, 0x10000, 0xa, '/dev/ptmx\x00', 0x0, '', 0x10, '-cgroupmime_type', 0x9, '/dev/kvm\x00'}, 0x35, '-em0wlan0bdevvmnet0-eth0selinuxmime_type,\'&wlan0&GPL&', r7, r8, r10}}, 0xa0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000540)=@ccm_128={{0x4}, "c8aaf6c998102c25", "6a0136e25a3caf13deb26524af7cb115", "0224a934", "e0c5f672ccb129f2"}, 0x28) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 2591.893741] validate_nla: 5 callbacks suppressed [ 2591.893751] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2592.026109] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2592.098923] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:54:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600090000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2592.183001] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x600}, 0x0) 03:54:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000030053b4", 0x33fe0}], 0x1}, 0x0) [ 2593.109395] kauditd_printk_skb: 141 callbacks suppressed [ 2593.109409] audit: type=1400 audit(2000001279.670:6177): avc: denied { create } for pid=15814 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2593.298817] audit: type=1400 audit(2000001279.680:6178): avc: denied { write } for pid=15814 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2593.404171] audit: type=1400 audit(2000001279.860:6179): avc: denied { map } for pid=15850 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2593.471618] audit: type=1400 audit(2000001279.860:6180): avc: denied { map } for pid=15850 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2593.528263] audit: type=1400 audit(2000001279.900:6181): avc: denied { map } for pid=15850 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2593.608621] audit: type=1400 audit(2000001279.910:6182): avc: denied { map } for pid=15850 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2593.657456] audit: type=1400 audit(2000001279.920:6183): avc: denied { create } for pid=15844 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:54:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_bt_hci(r3, 0x2cc789b15d517dd4, &(0x7f0000000000)="dd1042485d4af0519523") r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000080)={0x16}) [ 2593.696449] audit: type=1400 audit(2000001279.930:6184): avc: denied { map } for pid=15850 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2593.741885] audit: type=1400 audit(2000001279.940:6185): avc: denied { write } for pid=15844 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2593.779910] audit: type=1400 audit(2000001279.950:6186): avc: denied { create } for pid=15862 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2593.947855] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2593.983661] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x397, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2594.018285] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2594.045030] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:54:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xa}, 0x0) 03:54:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000a0000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2594.079347] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2594.118688] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x900}, 0x0) 03:54:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x200, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) syz_open_dev$video4linux(&(0x7f0000000240)='/dev/v4l-subdev#\x00', 0x90a9, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) [ 2594.626973] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2594.690531] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000040053b4", 0x33fe0}], 0x1}, 0x0) 03:54:42 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x4000000000002ea, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000080), 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) 03:54:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xb}, 0x0) [ 2596.183856] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:54:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000b0000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2596.451100] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:54:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 03:54:43 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="18030000f5ffffff05000000000000000400000000000000090000000000000084000000000000006e65742f6970365f666c6f776c6162656c006ec03114893458edc1c9d800000d8dae982640d0e6bb51d7ff596e1c92de0eaa319198e91f0a4d43697c1cb08250dc5074e369a42c7cf63d1a46b9a67ad1a9b0fd60acf33bd66432ebe50c0e8bdaf7fc39feff34ef27a1397193227f4733c145e66536c6c275112520e72b3097843b5cdac480c3b1384e9f592505f88589fcd2d700000000040000000000000000c000000000"], 0xcd) fchdir(r1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000280)={0xc, 0x1, 0x9, "f8842619abf72a795e56e791"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r4 = open(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r6 = fcntl$getown(r5, 0x9) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x9, 0x3, 0x2, 0x5, 0x0, 0x7, 0x83b80aa9082179de, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x8, 0x4}, 0x21000, 0x6fd0772f, 0xe12, 0xd95e5249c765c30e, 0x780, 0x2, 0x6}, r6, 0x3, r0, 0x8) open(0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000180)={0x41424344}, 0x1, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000300)={@val={0x0, 0x888e}, @val={0x0, 0x1, 0x7fff, 0x0, 0x6}, @ipv4={{0xa, 0x4, 0x0, 0x5, 0x60, 0x67, 0x0, 0x1f, 0x1d, 0x0, @broadcast, @local, {[@rr={0x7, 0x13, 0x20, [@dev, @multicast1, @dev, @broadcast]}, @end]}}, @tcp={{0x0, 0x4e20, r7, 0x41424344, 0x0, 0x0, 0xe, 0x10, 0xffde, 0x0, 0x7, {[@exp_smc={0xfe, 0x6}, @window={0x3, 0x3, 0x3}, @timestamp={0x8, 0xa, 0x0, 0xe6}, @exp_fastopen={0xfe, 0xe, 0xf989, "6434c900ed25cdaa898e"}]}}}}}, 0x6e) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x400103, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 03:54:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xf}, 0x0) [ 2598.077151] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2598.100934] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x398, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2598.141524] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2598.164112] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2598.193837] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2598.229986] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000020153b4", 0x33fe0}], 0x1}, 0x0) [ 2598.239005] kauditd_printk_skb: 155 callbacks suppressed [ 2598.239018] audit: type=1400 audit(2000001284.790:6342): avc: denied { create } for pid=16321 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:54:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xb00}, 0x0) [ 2598.345845] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2598.417862] audit: type=1400 audit(2000001284.800:6343): avc: denied { write } for pid=16321 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:54:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000e0000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2598.560209] audit: type=1400 audit(2000001284.810:6344): avc: denied { create } for pid=16352 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2598.749465] audit: type=1400 audit(2000001284.920:6345): avc: denied { map } for pid=16362 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2598.906950] audit: type=1400 audit(2000001284.930:6346): avc: denied { map } for pid=16362 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2599.172972] audit: type=1400 audit(2000001284.940:6347): avc: denied { map } for pid=16362 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 03:54:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2599.318025] audit: type=1400 audit(2000001284.950:6348): avc: denied { map } for pid=16362 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2599.501498] audit: type=1400 audit(2000001285.010:6350): avc: denied { map } for pid=16362 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2599.633835] audit: type=1400 audit(2000001285.010:6349): avc: denied { create } for pid=16357 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2599.762078] audit: type=1400 audit(2000001285.040:6351): avc: denied { map } for pid=16362 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2600.020492] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2600.063746] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2600.081974] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:54:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000f0000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000030153b4", 0x33fe0}], 0x1}, 0x0) [ 2601.341063] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2601.364306] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2601.405940] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2601.414884] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2601.433390] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:48 executing program 3: r0 = memfd_create(&(0x7f0000000400)='\xe8mu\xd4\xf74\x16G6\xf8V\xc0\r\xba+\xfd:\x12\x7ftO\xfc\x1f\xf9\bJ\xc2e\xcb\x1a\xfe.d\xee\xd9\x06:\v\x891%\xae\x96\xf1\xd7\xa0\x0e!\f\xe7\xc3\x0e\xc3<\f\xb9H;<\x97.\x8d\x9bQ\x8d\x9c-\x93\x89\a\xe1\xdcy\x84rB\x14?\xa5\xfe\xec\xbc\xa8@\xff\x0eE\x12\xe5|\xdcH\xf3\xa9\x1dLN\xc5\x8b\xc4H\xad\b\xf3\xf6m\x18\x02\xf1e\xe9\x83\x93w\xa9U\x93D\xd6\x8a\xbd\x17\x05\xa5pfh\x14]L1\x90', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x81) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) socketpair(0x1, 0x1, 0x3, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="000002", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r9}, 0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000000040)={r9, 0x1f, 0x0, 0x7, 0x7fff}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000100)={r10, 0x7, 0x1, [0x7f]}, 0xa) 03:54:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x399, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:54:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x48}, 0x0) 03:54:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xf00}, 0x0) 03:54:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600100000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000040153b4", 0x33fe0}], 0x1}, 0x0) [ 2602.408066] sctp: [Deprecated]: syz-executor.3 (pid 16748) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2602.408066] Use struct sctp_sack_info instead 03:54:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x4c}, 0x0) 03:54:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x2d6}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:54:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x217e}, 0x0) [ 2603.707710] kauditd_printk_skb: 139 callbacks suppressed [ 2603.707724] audit: type=1400 audit(2000001290.270:6491): avc: denied { create } for pid=16833 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2603.812710] audit: type=1400 audit(2000001290.270:6492): avc: denied { ioctl } for pid=16833 comm="syz-executor.5" path="socket:[522737]" dev="sockfs" ino=522737 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2603.901292] audit: type=1400 audit(2000001290.440:6493): avc: denied { map } for pid=16934 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x60}, 0x0) [ 2604.000467] audit: type=1400 audit(2000001290.440:6494): avc: denied { map } for pid=16934 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2604.147713] audit: type=1400 audit(2000001290.460:6495): avc: denied { map } for pid=16934 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2604.242017] audit: type=1400 audit(2000001290.460:6496): avc: denied { map } for pid=16934 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2604.284793] audit: type=1400 audit(2000001290.490:6497): avc: denied { create } for pid=16960 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2604.420430] audit: type=1400 audit(2000001290.500:6498): avc: denied { write } for pid=16960 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2604.536214] audit: type=1400 audit(2000001290.560:6499): avc: denied { map } for pid=16934 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2604.657519] audit: type=1400 audit(2000001290.600:6500): avc: denied { map } for pid=16959 comm="syz-executor.3" path="/root/syzkaller-testdir001740645/syzkaller.D3v9sg/4443/bus" dev="sda1" ino=17249 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 2604.761214] validate_nla: 3 callbacks suppressed [ 2604.761223] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2604.822813] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2604.872890] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:54:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x39a, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2604.956354] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:54:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000050153b4", 0x33fe0}], 0x1}, 0x0) 03:54:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600480000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x3f00}, 0x0) 03:54:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x356, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x80c}, 0x8000) 03:54:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x68}, 0x0) 03:54:52 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = memfd_create(&(0x7f0000000180)='GVL\x00\x00\x90U\x91\xaf\xd4\x01j\x12W\x11\x97e4\x0f\xc5m\xcc\x1b\xc2Y\x11\xdf\xd6\xb2n\xe1\x82\xd6\xb3\x1a\x98H\x06l\x0e\xa0\xa23\xba\nB\x87v\xaa\xe0\xec\xcb\xaf\xe7y\x87\x13\x06\xa8\xc4\xb4\x90\xa1\xef\xc5F\x80\xa0-\xcd{1uj1p\xfc\xe8\xc7uQ\xbfay\x8c\xb2\xca\xc8\xf5\x8be3\xa1,\x96\xc1k\x80\x04\x12\xb9!\xe6\x88\xc0U:\xe3\xc3\x92', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000040)) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300060000000000000000b73800000000000000000000000000200002000000000000000000000000004000000000000000000000ffff0000000000000000001a0000000000000003000000"], 0x5c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) [ 2606.860966] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:54:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x6c}, 0x0) [ 2606.914716] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2606.970129] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2606.998848] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:54:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000060153b4", 0x33fe0}], 0x1}, 0x0) 03:54:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006004c0000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x4000}, 0x0) 03:54:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x74}, 0x0) [ 2608.726645] kauditd_printk_skb: 142 callbacks suppressed [ 2608.726658] audit: type=1400 audit(2000001295.280:6643): avc: denied { create } for pid=17517 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2608.727705] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:54:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x39b, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:54:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="3800000010002507", @ANYRES32], 0x2}, 0x1, 0x0, 0x0, 0x2600c8ac}, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fcntl$getown(0xffffffffffffffff, 0x9) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='\xff\xff\xff\x7f\x00\b\x00\x00\x7f\xcf*\x00', 0x210040, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$rds(r4, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0x786}, 0x10) [ 2608.740199] audit: type=1400 audit(2000001295.290:6644): avc: denied { create } for pid=17370 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2608.865607] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2608.906362] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2608.915001] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2608.923686] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2608.951078] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2608.972658] audit: type=1400 audit(2000001295.290:6645): avc: denied { ioctl } for pid=17517 comm="syz-executor.5" path="socket:[522917]" dev="sockfs" ino=522917 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:54:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600600000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2609.137072] audit: type=1400 audit(2000001295.350:6646): avc: denied { write } for pid=17370 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:54:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000070153b4", 0x33fe0}], 0x1}, 0x0) [ 2609.295273] audit: type=1400 audit(2000001295.370:6647): avc: denied { write } for pid=17517 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2609.470378] audit: type=1400 audit(2000001295.400:6648): avc: denied { create } for pid=17380 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2609.671996] audit: type=1400 audit(2000001295.640:6649): avc: denied { create } for pid=17517 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2609.851271] audit: type=1400 audit(2000001295.760:6650): avc: denied { map } for pid=17564 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:54:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x7a}, 0x0) 03:54:56 executing program 3: fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x10000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) [ 2610.028360] audit: type=1400 audit(2000001295.760:6651): avc: denied { map } for pid=17564 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2610.183326] audit: type=1400 audit(2000001295.760:6652): avc: denied { map } for pid=17564 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2610.742866] validate_nla: 1 callbacks suppressed [ 2610.742876] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2611.083555] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2611.360650] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:54:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0x5, 0x4}]}, 0x28}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) 03:54:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600680000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x7e21}, 0x0) [ 2611.559671] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2611.581832] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000080153b4", 0x33fe0}], 0x1}, 0x0) 03:54:58 executing program 3: socket(0x200000000010, 0x5, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = socket(0x2, 0x5, 0xc) getsockopt$inet_dccp_buf(r0, 0x21, 0xf, &(0x7f00000003c0)=""/136, &(0x7f0000000080)=0x88) socket$inet6_udp(0xa, 0x2, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000700)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') r1 = syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x3, 0x1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000000100)=""/7, &(0x7f0000000300)=0x7) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) request_key(0x0, &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x4c8}, 0x200000000, 0x80000000000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x700, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e20, @broadcast}, {0x6, @remote}, 0x10, {0x2, 0x4e20, @empty}, 'sit0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000740)={0x0, 0x20, 0x380000000000000, 'queue1\x00'}) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x20, 0x0) close(0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340)=@assoc_value={0x0, 0x1f}, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) [ 2612.499772] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:54:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x39c, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2612.543220] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2612.596118] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2612.604783] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2612.613556] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2612.652180] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:54:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xf0}, 0x0) 03:54:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006006c0000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:54:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 03:54:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000090153b4", 0x33fe0}], 0x1}, 0x0) 03:54:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x40, 0x0, 0x274) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x40, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)="2c30e3", 0x0, 0x3, 0xffffffffffffffdb}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000000)={0x7fffffff, 0x7}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2613.401951] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2613.503965] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2613.536732] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x33fb0}, 0x0) [ 2613.765305] kauditd_printk_skb: 175 callbacks suppressed [ 2613.765319] audit: type=1400 audit(2000001300.330:6828): avc: denied { create } for pid=17947 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2613.925795] audit: type=1400 audit(2000001300.370:6829): avc: denied { map } for pid=17953 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2614.062760] audit: type=1400 audit(2000001300.400:6830): avc: denied { map } for pid=17953 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2614.164217] audit: type=1400 audit(2000001300.450:6831): avc: denied { map } for pid=17953 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2614.291579] audit: type=1400 audit(2000001300.460:6832): avc: denied { map } for pid=17953 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2614.370330] audit: type=1400 audit(2000001300.470:6833): avc: denied { map } for pid=17959 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x300}, 0x0) [ 2614.495229] audit: type=1400 audit(2000001300.480:6834): avc: denied { map } for pid=17959 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2614.563639] audit: type=1400 audit(2000001300.530:6835): avc: denied { map } for pid=17959 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2614.808679] audit: type=1400 audit(2000001300.530:6836): avc: denied { map } for pid=17959 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:01 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0xf9362fd4ad07af33, 0x6, {0x7, 0x1f, 0x4, 0x40100, 0x800, 0x5, 0x7f, 0xfff}}, 0x50) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="3034b300002000000000010400000f97f90000000028fc", @ANYRES32=0x0, @ANYBLOB="000000000000000010001200080001007674693604000200"], 0x30}}, 0x0) [ 2614.912648] audit: type=1400 audit(2000001300.590:6837): avc: denied { map } for pid=17959 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2615.439410] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600740000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000a0153b4", 0x33fe0}], 0x1}, 0x0) [ 2615.813025] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pig=18196 comm=syz-executor.3 03:55:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc822, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000180)=@gcm_128={{0x303}, "5f7a44d64aa98013", "377207a72ac779f0f4084367f7cd8ad0", "7f2d13b2", "4cbb48892c71f878"}, 0x28) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bcsf0\x00', @ifru_addrs=@ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) getegid() [ 2616.917691] bond0: Error: Device is in use and cannot be enslaved [ 2617.002305] validate_nla: 2 callbacks suppressed [ 2617.002313] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2617.038629] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x500}, 0x0) 03:55:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x39d, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2617.058984] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2617.087172] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x34000}, 0x0) 03:55:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006007a0000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2617.174331] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2617.246796] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2617.286023] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2617.318359] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2617.346531] bond0: Error: Device is in use and cannot be enslaved 03:55:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000b0153b4", 0x33fe0}], 0x1}, 0x0) 03:55:04 executing program 3: syz_emit_ethernet(0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="0b3499d9bd3eaaaaaaaaaa0086dd60000000004d8800fe880000000000000000000000000001ff02000000000000000000000000000100004e20004c9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862530934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"], 0x0) 03:55:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x600}, 0x0) 03:55:04 executing program 3: [ 2618.716662] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2618.724387] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x400300}, 0x0) 03:55:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600f00000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:05 executing program 3: [ 2618.978743] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2619.087908] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2619.604287] kauditd_printk_skb: 146 callbacks suppressed [ 2619.604300] audit: type=1400 audit(2000001306.160:6984): avc: denied { map } for pid=18477 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2619.706729] audit: type=1400 audit(2000001306.170:6985): avc: denied { create } for pid=18521 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:55:06 executing program 3: 03:55:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000e0153b4", 0x33fe0}], 0x1}, 0x0) [ 2619.845908] audit: type=1400 audit(2000001306.170:6986): avc: denied { write } for pid=18521 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2620.003958] audit: type=1400 audit(2000001306.200:6987): avc: denied { map } for pid=18477 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2620.120503] audit: type=1400 audit(2000001306.220:6988): avc: denied { map } for pid=18477 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2620.228722] audit: type=1400 audit(2000001306.220:6989): avc: denied { map } for pid=18477 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2620.314343] audit: type=1400 audit(2000001306.220:6990): avc: denied { map } for pid=18577 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2620.437703] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2620.463009] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2620.474002] audit: type=1400 audit(2000001306.220:6991): avc: denied { map } for pid=18577 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2620.495125] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2620.525238] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x39e, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:07 executing program 3: [ 2620.579716] audit: type=1400 audit(2000001306.230:6992): avc: denied { create } for pid=18522 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:55:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600590200010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x700}, 0x0) [ 2620.706893] audit: type=1400 audit(2000001306.240:6993): avc: denied { map } for pid=18477 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 03:55:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000f0153b4", 0x33fe0}], 0x1}, 0x0) 03:55:07 executing program 3: 03:55:08 executing program 3: [ 2622.046393] validate_nla: 3 callbacks suppressed [ 2622.046403] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2622.093904] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x900}, 0x0) 03:55:09 executing program 3: [ 2623.115884] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2623.140723] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2623.166921] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2623.174409] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000100153b4", 0x33fe0}], 0x1}, 0x0) 03:55:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000300010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x39f, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) [ 2623.856982] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2623.928035] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2624.018171] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2624.068132] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:10 executing program 3: [ 2624.152807] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:55:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000500010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2624.203989] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:55:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 2624.261524] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000480153b4", 0x33fe0}], 0x1}, 0x0) [ 2624.610933] kauditd_printk_skb: 149 callbacks suppressed [ 2624.610947] audit: type=1400 audit(2000001311.170:7143): avc: denied { map } for pid=18932 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 03:55:11 executing program 3: [ 2624.757211] audit: type=1400 audit(2000001311.220:7144): avc: denied { map } for pid=18918 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2624.848410] audit: type=1400 audit(2000001311.240:7145): avc: denied { map } for pid=18918 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2624.959780] audit: type=1400 audit(2000001311.290:7146): avc: denied { map } for pid=18932 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2625.084880] audit: type=1400 audit(2000001311.300:7147): avc: denied { create } for pid=18941 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2625.184631] audit: type=1400 audit(2000001311.320:7148): avc: denied { map } for pid=18918 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2625.328377] audit: type=1400 audit(2000001311.320:7149): avc: denied { map } for pid=18918 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2625.437639] audit: type=1400 audit(2000001311.320:7150): avc: denied { write } for pid=18941 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:55:12 executing program 3: [ 2625.523504] audit: type=1400 audit(2000001311.360:7151): avc: denied { map } for pid=18932 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2625.553665] audit: type=1400 audit(2000001311.360:7152): avc: denied { map } for pid=18932 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2625.727133] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000600010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 03:55:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xb00}, 0x0) 03:55:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3a0, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100004c0153b4", 0x33fe0}], 0x1}, 0x0) 03:55:13 executing program 3: [ 2627.096384] validate_nla: 3 callbacks suppressed [ 2627.096394] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2627.153883] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2627.182650] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2627.254734] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:55:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000700010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x5000000}, 0x0) 03:55:14 executing program 3: 03:55:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000600153b4", 0x33fe0}], 0x1}, 0x0) 03:55:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xf00}, 0x0) 03:55:14 executing program 3: [ 2628.800660] syz-executor.2 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 2628.816774] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 2628.831483] CPU: 0 PID: 19314 Comm: syz-executor.2 Not tainted 4.19.81 #0 [ 2628.838461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2628.847830] Call Trace: [ 2628.850439] dump_stack+0x172/0x1f0 [ 2628.854084] dump_header+0x15e/0xa55 [ 2628.857812] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2628.865293] ? ___ratelimit+0x60/0x595 [ 2628.869184] ? do_raw_spin_unlock+0x57/0x270 [ 2628.873607] oom_kill_process.cold+0x10/0x6ef [ 2628.878210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2628.883757] ? task_will_free_mem+0x139/0x6e0 [ 2628.888268] out_of_memory+0x362/0x1330 [ 2628.892259] ? lock_downgrade+0x880/0x880 03:55:15 executing program 3: [ 2628.896425] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2628.901548] ? oom_killer_disable+0x280/0x280 [ 2628.906074] ? find_held_lock+0x35/0x130 [ 2628.910157] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2628.915013] ? memcg_event_wake+0x230/0x230 [ 2628.919538] ? do_raw_spin_unlock+0x57/0x270 [ 2628.923965] ? _raw_spin_unlock+0x2d/0x50 [ 2628.928137] try_charge+0xef7/0x1480 [ 2628.931856] ? find_held_lock+0x35/0x130 [ 2628.935913] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2628.940752] ? kasan_check_read+0x11/0x20 [ 2628.944902] ? get_mem_cgroup_from_mm+0x156/0x320 [ 2628.949760] mem_cgroup_try_charge+0x259/0x6b0 [ 2628.954343] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 2628.959268] __handle_mm_fault+0x1e50/0x3f80 [ 2628.963669] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 2628.968537] ? count_memcg_event_mm+0x2b1/0x4d0 [ 2628.973210] handle_mm_fault+0x1b5/0x690 [ 2628.977269] __do_page_fault+0x62a/0xe90 [ 2628.981345] ? vmalloc_fault+0x740/0x740 [ 2628.985409] ? trace_hardirqs_off_caller+0x65/0x220 [ 2628.990534] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2628.995480] ? page_fault+0x8/0x30 [ 2628.999028] do_page_fault+0x71/0x57d [ 2629.002828] ? page_fault+0x8/0x30 [ 2629.006373] page_fault+0x1e/0x30 [ 2629.009839] RIP: 0033:0x41173f [ 2629.013044] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 2629.031944] RSP: 002b:00007ffd22df95c0 EFLAGS: 00010206 [ 2629.037321] RAX: 00007ff94cfc4000 RBX: 0000000000020000 RCX: 0000000000459f9a [ 2629.044602] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 2629.051871] RBP: 00007ffd22df96a0 R08: ffffffffffffffff R09: 0000000000000000 [ 2629.059133] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd22df9790 [ 2629.066494] R13: 00007ff94cfe4700 R14: 0000000000000003 R15: 000000000075c124 [ 2629.080067] Task in /syz2 killed as a result of limit of /syz2 [ 2629.088336] memory: usage 307200kB, limit 307200kB, failcnt 4300 [ 2629.095247] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2629.103640] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2629.110427] Memory cgroup stats for /syz2: cache:0KB rss:152988KB rss_huge:129024KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:153072KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2629.132605] Memory cgroup out of memory: Kill process 11908 (syz-executor.2) score 1113 or sacrifice child [ 2629.143073] Killed process 11908 (syz-executor.2) total-vm:72588kB, anon-rss:2208kB, file-rss:35804kB, shmem-rss:0kB [ 2629.191828] syz-executor.2 invoked oom-killer: gfp_mask=0x6040d0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), nodemask=(null), order=0, oom_score_adj=1000 [ 2629.226958] syz-executor.2 cpuset=syz2 mems_allowed=0-1 [ 2629.232566] CPU: 0 PID: 19316 Comm: syz-executor.2 Not tainted 4.19.81 #0 [ 2629.239503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2629.248874] Call Trace: [ 2629.251668] dump_stack+0x172/0x1f0 [ 2629.255320] dump_header+0x15e/0xa55 [ 2629.259056] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2629.264173] ? ___ratelimit+0x60/0x595 [ 2629.268086] ? do_raw_spin_unlock+0x57/0x270 [ 2629.272521] oom_kill_process.cold+0x10/0x6ef [ 2629.277035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2629.283278] ? task_will_free_mem+0x139/0x6e0 [ 2629.287802] out_of_memory+0x362/0x1330 [ 2629.291801] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 2629.296919] ? oom_killer_disable+0x280/0x280 [ 2629.301429] ? find_held_lock+0x35/0x130 [ 2629.305510] mem_cgroup_out_of_memory+0x1d2/0x240 [ 2629.310368] ? memcg_event_wake+0x230/0x230 [ 2629.315326] ? do_raw_spin_unlock+0x57/0x270 [ 2629.319749] ? _raw_spin_unlock+0x2d/0x50 [ 2629.323959] try_charge+0xc4e/0x1480 [ 2629.327710] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 2629.332585] ? rcu_read_lock_sched_held+0x110/0x130 [ 2629.337623] ? __alloc_pages_nodemask+0x632/0x750 [ 2629.342494] memcg_kmem_charge_memcg+0x83/0x170 [ 2629.347177] ? mark_held_locks+0xb1/0x100 [ 2629.351360] ? memcg_kmem_put_cache+0xb0/0xb0 [ 2629.355869] ? cache_grow_begin+0x597/0x8c0 [ 2629.360311] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2629.364918] ? trace_hardirqs_on+0x67/0x220 [ 2629.369261] cache_grow_begin+0x3fa/0x8c0 [ 2629.373426] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2629.378999] ? __cpuset_node_allowed+0x136/0x540 [ 2629.383778] fallback_alloc+0x1fd/0x2d0 [ 2629.387798] ____cache_alloc_node+0x1be/0x1e0 [ 2629.392323] kmem_cache_alloc+0x1f3/0x700 [ 2629.396484] ? lookup_one_len+0x10e/0x1a0 [ 2629.400654] alloc_inode+0xb6/0x190 [ 2629.404297] new_inode_pseudo+0x19/0xf0 [ 2629.408292] new_inode+0x1f/0x40 [ 2629.411760] debugfs_get_inode+0x1a/0x130 [ 2629.415927] __debugfs_create_file+0xb9/0x400 [ 2629.420610] debugfs_create_file+0x5a/0x70 [ 2629.424866] mac80211_hwsim_new_radio+0x1f8f/0x3df0 [ 2629.429932] ? cred_has_capability+0x193/0x320 [ 2629.434537] ? hwsim_exit_net+0xc50/0xc50 [ 2629.438694] ? trace_hardirqs_off+0x62/0x220 [ 2629.443121] hwsim_new_radio_nl+0x5eb/0x893 [ 2629.448242] ? security_capable+0x70/0xc0 [ 2629.452408] ? mac80211_hwsim_new_radio+0x3df0/0x3df0 [ 2629.457620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2629.463173] ? nla_parse+0x1fc/0x2f0 [ 2629.466908] genl_family_rcv_msg+0x6db/0xd30 [ 2629.471338] ? genl_unregister_family+0x790/0x790 [ 2629.476211] ? __local_bh_enable_ip+0x15a/0x270 [ 2629.481381] ? __dev_queue_xmit+0x892/0x2fe0 [ 2629.485822] genl_rcv_msg+0xca/0x170 [ 2629.489557] netlink_rcv_skb+0x17d/0x460 [ 2629.493629] ? genl_family_rcv_msg+0xd30/0xd30 [ 2629.498233] ? netlink_ack+0xb30/0xb30 [ 2629.502156] genl_rcv+0x29/0x40 [ 2629.505470] netlink_unicast+0x537/0x720 [ 2629.509558] ? netlink_attachskb+0x770/0x770 [ 2629.513990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2629.519566] netlink_sendmsg+0x8ae/0xd70 [ 2629.523653] ? netlink_unicast+0x720/0x720 [ 2629.527912] ? selinux_socket_sendmsg+0x36/0x40 [ 2629.532603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2629.538170] ? security_socket_sendmsg+0x8d/0xc0 [ 2629.542973] ? netlink_unicast+0x720/0x720 [ 2629.547224] sock_sendmsg+0xd7/0x130 [ 2629.551138] ___sys_sendmsg+0x803/0x920 [ 2629.555130] ? copy_msghdr_from_user+0x430/0x430 [ 2629.559912] ? lock_downgrade+0x880/0x880 [ 2629.564083] ? kasan_check_read+0x11/0x20 [ 2629.568251] ? __fget+0x367/0x540 [ 2629.571731] ? iterate_fd+0x360/0x360 [ 2629.575551] ? lock_downgrade+0x880/0x880 [ 2629.579725] ? __fget_light+0x1a9/0x230 [ 2629.583717] ? __fdget+0x1b/0x20 [ 2629.587095] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2629.592648] __sys_sendmsg+0x105/0x1d0 [ 2629.596551] ? __ia32_sys_shutdown+0x80/0x80 [ 2629.600993] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2629.605759] ? do_syscall_64+0x26/0x620 [ 2629.609743] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2629.615125] ? do_syscall_64+0x26/0x620 [ 2629.619118] __x64_sys_sendmsg+0x78/0xb0 [ 2629.623206] do_syscall_64+0xfd/0x620 [ 2629.627028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2629.632234] RIP: 0033:0x459f49 [ 2629.635441] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2629.654611] RSP: 002b:00007ff94d046c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2629.662473] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 2629.669744] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2629.677024] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2629.684638] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff94d0476d4 [ 2629.691905] R13: 00000000004c8310 R14: 00000000004de5d8 R15: 00000000ffffffff [ 2629.700204] Task in /syz2 killed as a result of limit of /syz2 [ 2629.707521] memory: usage 304832kB, limit 307200kB, failcnt 4300 [ 2629.713812] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 2629.721687] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 03:55:16 executing program 3: [ 2629.730369] Memory cgroup stats for /syz2: cache:0KB rss:150932KB rss_huge:126976KB shmem:0KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:150920KB inactive_file:0KB active_file:0KB unevictable:0KB [ 2629.753144] Memory cgroup out of memory: Kill process 12335 (syz-executor.2) score 1113 or sacrifice child [ 2629.763507] Killed process 12335 (syz-executor.2) total-vm:72588kB, anon-rss:2208kB, file-rss:35804kB, shmem-rss:0kB [ 2629.776766] oom_reaper: reaped process 12335 (syz-executor.2), now anon-rss:0kB, file-rss:34844kB, shmem-rss:0kB [ 2629.916669] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000900010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2630.245092] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2630.252560] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2630.283635] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2630.668164] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2630.700926] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2630.714651] kauditd_printk_skb: 142 callbacks suppressed [ 2630.714663] audit: type=1400 audit(2000001317.270:7295): avc: denied { map } for pid=19539 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2630.944844] audit: type=1400 audit(2000001317.280:7296): avc: denied { map } for pid=19539 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2631.069592] audit: type=1400 audit(2000001317.280:7297): avc: denied { map } for pid=19539 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2631.198260] audit: type=1400 audit(2000001317.280:7298): avc: denied { map } for pid=19539 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2631.333524] audit: type=1400 audit(2000001317.280:7299): avc: denied { map } for pid=19541 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2631.390422] audit: type=1400 audit(2000001317.280:7300): avc: denied { map } for pid=19541 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2631.420230] audit: type=1400 audit(2000001317.280:7301): avc: denied { map } for pid=19541 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2631.471815] audit: type=1400 audit(2000001317.340:7302): avc: denied { map } for pid=19539 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2631.498154] audit: type=1400 audit(2000001317.360:7303): avc: denied { map } for pid=19541 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2631.522634] audit: type=1400 audit(2000001317.380:7304): avc: denied { map } for pid=19541 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2631.679254] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3a1, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000680153b4", 0x33fe0}], 0x1}, 0x0) 03:55:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x6000000}, 0x0) 03:55:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x2000}, 0x0) 03:55:18 executing program 3: 03:55:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000a00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:18 executing program 3: [ 2631.916783] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2631.980368] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2632.016933] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2632.046705] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100006c0153b4", 0x33fe0}], 0x1}, 0x0) 03:55:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x8000000}, 0x0) [ 2632.310739] validate_nla: 1 callbacks suppressed [ 2632.310749] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000b00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:19 executing program 3: 03:55:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x2cf2}, 0x0) [ 2634.016050] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2634.041383] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2634.205861] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:55:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3a2, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:21 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000180)) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40405) dup2(r0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x2}}, 0x20) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, 0x0, 0x10000, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r7}]]}}}]}, 0x38}}, 0x0) ioctl$FICLONE(r3, 0x40049409, r1) 03:55:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000740153b4", 0x33fe0}], 0x1}, 0x0) [ 2634.969346] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x4800}, 0x0) 03:55:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x9000000}, 0x0) 03:55:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000e00010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2635.796927] kauditd_printk_skb: 128 callbacks suppressed [ 2635.796942] audit: type=1400 audit(2000001322.360:7433): avc: denied { create } for pid=19879 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2635.898143] audit: type=1400 audit(2000001322.390:7434): avc: denied { create } for pid=19880 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:55:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xa000000}, 0x0) [ 2636.083301] audit: type=1400 audit(2000001322.420:7435): avc: denied { map } for pid=19991 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x4c00}, 0x0) 03:55:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100007a0153b4", 0x33fe0}], 0x1}, 0x0) [ 2636.287531] audit: type=1400 audit(2000001322.440:7436): avc: denied { map } for pid=19991 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2636.420494] audit: type=1400 audit(2000001322.440:7437): avc: denied { map } for pid=19991 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2636.576350] audit: type=1400 audit(2000001322.440:7438): avc: denied { map } for pid=19991 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2636.671429] audit: type=1400 audit(2000001322.500:7439): avc: denied { map } for pid=19991 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2636.720520] audit: type=1400 audit(2000001322.510:7440): avc: denied { map } for pid=19917 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2636.853971] audit: type=1400 audit(2000001322.530:7441): avc: denied { map } for pid=19917 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2636.917157] audit: type=1400 audit(2000001322.530:7442): avc: denied { create } for pid=19999 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2636.962529] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2637.046058] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2637.053750] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:55:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{}, {0x5, 0x0, 0x0, 0x3}]}, 0x10) r1 = syz_open_dev$vcsa(0x0, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x0, 0x7}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2637.096521] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000f00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xb000000}, 0x0) [ 2638.527388] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2638.548714] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3a3, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000353b4", 0x33fe0}], 0x1}, 0x0) 03:55:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 03:55:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@flushpolicy={0x10, 0x12, 0x4e326d0846e0c13d}, 0x10}, 0x8}, 0x0) 03:55:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xe000000}, 0x0) 03:55:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600002000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2638.849372] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2638.942454] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2639.025725] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2639.069210] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:25 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:55:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000553b4", 0x33fe0}], 0x1}, 0x0) 03:55:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600004000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x6800}, 0x0) 03:55:26 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r0, &(0x7f0000003080)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@hopopts_2292={{0x28, 0x29, 0xb, {0x0, 0x1, [], [@calipso={0x7, 0x8}]}}}], 0x28}}], 0x1, 0x0) [ 2640.524075] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2640.545100] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2640.553845] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:27 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() ptrace(0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000000)={0x0, 0x1, 0x0, [], &(0x7f00000001c0)={0xf0f045, 0x0, [], @ptr}}) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x10}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r2, 0xc0585604, &(0x7f0000000240)={0x0, 0x0, {0x0, 0x0, 0x3011, 0x0, 0x7, 0x7, 0x2}}) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0xb8) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) getpid() r4 = getpid() lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) sched_setscheduler(r4, 0x5, 0x0) tgkill(0x0, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$BLKDISCARD(r6, 0x1277, &(0x7f0000000200)=0x8) syz_open_dev$swradio(0x0, 0x1, 0x2) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x836e}], 0x20000000000000d8, 0x0, 0x0, 0xfffffffffffffd6a) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f00000003c0)) [ 2641.487414] kauditd_printk_skb: 162 callbacks suppressed [ 2641.487427] audit: type=1400 audit(2000001328.050:7605): avc: denied { map } for pid=20411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2641.571907] audit: type=1400 audit(2000001328.050:7606): avc: denied { map } for pid=20411 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2641.598786] audit: type=1400 audit(2000001328.050:7607): avc: denied { map } for pid=20411 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2641.652470] audit: type=1400 audit(2000001328.050:7608): avc: denied { map } for pid=20411 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2641.682366] audit: type=1400 audit(2000001328.090:7609): avc: denied { map } for pid=20411 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2641.777936] audit: type=1400 audit(2000001328.110:7610): avc: denied { map } for pid=20411 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2641.806225] audit: type=1400 audit(2000001328.110:7611): avc: denied { map } for pid=20411 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2641.831688] audit: type=1400 audit(2000001328.130:7612): avc: denied { map } for pid=20411 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2641.859716] audit: type=1400 audit(2000001328.160:7613): avc: denied { map } for pid=20411 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2641.920465] audit: type=1400 audit(2000001328.170:7614): avc: denied { map } for pid=20411 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2642.010380] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3a4, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 03:55:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000953b4", 0x33fe0}], 0x1}, 0x0) 03:55:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000780)=[{0x0, 0x0, 0x8000}, {&(0x7f0000000540)="655eb5db05446af051d7b7d9a6340ac81fb09ad65e37b73fc888c16eaf8f6e00c4a066ed58fc23ee199be8c9281f2c90c15f2aeabdcba5be1f754d67c5415996a2573e4cc0131f38259d7b17e993469e28d8444bc6ee6fa14ad0996492d118703275", 0x62, 0x4}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7571756f74612c6771756f74612c6e6f646973636172642c7071756f74612c62736467726f7570732c00c79a06fab1ec462c3a3590f7c23dc419edba2afd77e6c2293e663b7fc8"]) [ 2642.053864] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2642.079861] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600004800010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x6c00}, 0x0) [ 2642.202329] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2642.263827] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2642.337602] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x10000000}, 0x0) 03:55:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000a53b4", 0x33fe0}], 0x1}, 0x0) [ 2643.083623] XFS (loop3): Invalid superblock magic number 03:55:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x7, @rand_addr="9fb9831fa10a708c663c930dcf831aa6", 0x3ff}}, [0x20, 0x8000, 0xffffffff, 0x6, 0x10000, 0x5fe, 0xfff, 0x1, 0x7, 0x8, 0x7, 0xfffffffffffffc00, 0x80000001, 0x2, 0x9]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000340)={r4, 0x3}, 0x8) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f0000000480)) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) setsockopt$inet_opts(r5, 0x0, 0x1, &(0x7f0000000040)="03fcfbcd2a1f1288051e9b41d4e8527f2ff89c14d197e4353de428880135ac8168e601115849f2c07a39d5d2828fa5807d457b75892a15a3211b8a4d6471a8b8e3052806e6d82b01356cee79ed4562340b45a3abf1b99e2666bf092eae4a94c6bf695e4ea094284403949470bcf80ff26bb71984f96e520aaa807ac3752ad464c57abe8938df12b420a56f71c87fef3884634db4c32026560108bca10c00321f6e010edffb923df90afae9d8846d464752fdbca8b2bdc93cb6165cd831708454ad7366ac594581b3", 0xc8) fstat(r1, &(0x7f00000001c0)) 03:55:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x7400}, 0x0) [ 2643.815850] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2643.823437] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2643.835855] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2643.906163] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600004c00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000010d53b4", 0x33fe0}], 0x1}, 0x0) [ 2645.343497] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2645.377049] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2645.385881] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2645.425855] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3a5, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:32 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket(0x15, 0x80005, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) socket(0x10, 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0x9) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 03:55:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x7a00}, 0x0) 03:55:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 03:55:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600025900010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000002553b4", 0x33fe0}], 0x1}, 0x0) [ 2645.723464] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2645.763949] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 03:55:33 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f00000003c0)=0x1, 0x4) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f00000005c0)="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") ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r5 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r5, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r5, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file1\x00', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f00000002c0)='./file0/../file0/file0\x00', &(0x7f0000000340)='sysfs\x00', 0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0/../file0/file0\x00', 0x5af4, 0x2, &(0x7f0000000300)=[{&(0x7f0000000400)="d2f8bc8cbe29f703d3b2fd41c38992b0cb2de73ce4f5696d748347aa5aeb7f6524cf5219a94219087b6c020b5d9de709dd9a22b016336cff8045b60ce32d2f724be52ef5cb31a9f117d6e89cd343a604b8faabcdb254b6be8f7154e141666302e6853ce647c6b0b43ef0ef8bfd2ef94f40077eaf8b90276ae4a71234c0465e25", 0x80, 0x3f}, {&(0x7f0000000480)="ea53956542b2dba977f89f240ac45ebfc91850f0fea92727aa0744146039d370d64cafda184f96d3d84f207c17ee218431627dbfd5b0b3cf2059821ac117ac25d503bbd520578ed84c60127387e2b9e41c7cc08a8a623de3c6b225c53353728271899a2a0b28f3614d31f1db95709aceb982ff34aa4c9fcaf895bedd4b330bf510806edbb70101f3987250decaf537597b3e917207ccb1462f628c16cebf04f816329cb06cd968", 0xa7, 0x3f}], 0x4, &(0x7f0000000540)={[], [{@measure='measure'}, {@pcr={'pcr', 0x3d, 0x19}}, {@appraise_type='appraise_type=imasig'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x61, 0x34, 0x36, 0x35, 0x63, 0x732056f9f09316b3, 0x65], 0x2d, [0x30, 0x33, 0x34, 0x66], 0x2d, [0x39, 0x30, 0x62, 0x62], 0x2d, [0x31, 0x61, 0x66, 0x3a], 0x2d, [0x64, 0x36, 0x6, 0x32, 0x0, 0x11, 0x65, 0x38]}}}]}) [ 2646.986382] kauditd_printk_skb: 160 callbacks suppressed [ 2646.986396] audit: type=1400 audit(2000001333.550:7775): avc: denied { create } for pid=20751 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2647.064963] audit: type=1400 audit(2000001333.610:7776): avc: denied { create } for pid=20741 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2647.116046] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2647.189243] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2647.259433] audit: type=1400 audit(2000001333.650:7777): avc: denied { write } for pid=20741 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2647.408263] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2647.441155] audit: type=1400 audit(2000001333.720:7778): avc: denied { map } for pid=20836 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2647.593705] audit: type=1400 audit(2000001333.730:7779): avc: denied { map } for pid=20836 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2647.777956] audit: type=1400 audit(2000001333.750:7780): avc: denied { create } for pid=20837 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:55:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600006000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x40000000}, 0x0) [ 2647.838021] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2647.989292] audit: type=1400 audit(2000001333.760:7781): avc: denied { ioctl } for pid=20837 comm="syz-executor.5" path="socket:[525747]" dev="sockfs" ino=525747 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:55:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000003553b4", 0x33fe0}], 0x1}, 0x0) [ 2648.164699] audit: type=1400 audit(2000001333.770:7782): avc: denied { map } for pid=20836 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2648.258948] audit: type=1400 audit(2000001333.780:7784): avc: denied { write } for pid=20837 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2648.344278] audit: type=1400 audit(2000001333.780:7783): avc: denied { map } for pid=20836 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2648.849343] validate_nla: 3 callbacks suppressed [ 2648.849351] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:55:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r2, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x5caad999, 0x0, 0x0, 0x362) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) tkill(0x0, 0x0) [ 2648.902247] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3a6, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2648.947053] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2648.982864] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:55:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xf22c}, 0x0) [ 2649.011189] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2649.042389] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600006800010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 03:55:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000003f53b4", 0x33fe0}], 0x1}, 0x0) 03:55:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x34000}, 0x0) [ 2650.586093] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2650.593604] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2650.622156] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2650.670296] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:55:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600006c00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x7e210000}, 0x0) 03:55:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x400300}, 0x0) 03:55:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000004053b4", 0x33fe0}], 0x1}, 0x0) 03:55:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)=0x1) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x374) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac41f1de628e2a3166", 0xd1, 0x0, 0x0, 0x0) 03:55:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000040)={'veth0\x00', 0x18}) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 2652.498922] kauditd_printk_skb: 120 callbacks suppressed [ 2652.498935] audit: type=1400 audit(2000001339.060:7905): avc: denied { create } for pid=21376 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2652.563645] audit: type=1400 audit(2000001339.090:7906): avc: denied { create } for pid=21377 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2653.155785] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2653.164238] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2653.560328] audit: type=1400 audit(2000001340.120:7907): avc: denied { map } for pid=21589 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2653.600419] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2653.622230] audit: type=1400 audit(2000001340.120:7908): avc: denied { map } for pid=21589 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2653.635121] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2653.686329] audit: type=1400 audit(2000001340.130:7909): avc: denied { map } for pid=21589 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2653.779248] audit: type=1400 audit(2000001340.130:7910): avc: denied { map } for pid=21589 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2653.845554] audit: type=1400 audit(2000001340.140:7911): avc: denied { map } for pid=21589 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2653.941668] audit: type=1400 audit(2000001340.170:7912): avc: denied { map } for pid=21589 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600007400010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3a7, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000005253b4", 0x33fe0}], 0x1}, 0x0) [ 2654.035903] audit: type=1400 audit(2000001340.180:7913): avc: denied { map } for pid=21589 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x6b6b6b}, 0x0) 03:55:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) [ 2654.242707] audit: type=1400 audit(2000001340.230:7914): avc: denied { map } for pid=21589 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) [ 2655.166041] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2655.188283] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2655.280800] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 03:55:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xb03f0300}, 0x0) 03:55:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000005d53b4", 0x33fe0}], 0x1}, 0x0) [ 2655.927526] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600007a00010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 2657.004576] bridge0: port 3(gretap0) entered disabled state [ 2657.015989] device gretap0 left promiscuous mode [ 2657.021355] bridge0: port 3(gretap0) entered disabled state [ 2657.225983] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2657.296010] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2657.312472] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2657.366075] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2657.683949] kauditd_printk_skb: 94 callbacks suppressed [ 2657.683962] audit: type=1400 audit(2000001344.240:8009): avc: denied { create } for pid=22022 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2657.882800] audit: type=1400 audit(2000001344.440:8010): avc: denied { map } for pid=22236 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2657.985862] audit: type=1400 audit(2000001344.480:8011): avc: denied { map } for pid=22236 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2658.114902] audit: type=1400 audit(2000001344.500:8012): avc: denied { map } for pid=22236 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2658.201582] audit: type=1400 audit(2000001344.500:8013): avc: denied { map } for pid=22236 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2658.290876] audit: type=1400 audit(2000001344.540:8014): avc: denied { map } for pid=22236 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2658.371391] IPVS: ftp: loaded support on port[0] = 21 [ 2658.384823] audit: type=1400 audit(2000001344.590:8015): avc: denied { map } for pid=22236 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2658.470681] audit: type=1400 audit(2000001344.610:8016): avc: denied { map } for pid=22236 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2658.576334] audit: type=1400 audit(2000001344.660:8017): avc: denied { map } for pid=22236 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2658.625403] audit: type=1400 audit(2000001344.660:8018): avc: denied { map } for pid=22236 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2659.161797] chnl_net:caif_netlink_parms(): no params data found [ 2659.328542] bridge0: port 1(bridge_slave_0) entered blocking state [ 2659.336789] bridge0: port 1(bridge_slave_0) entered disabled state [ 2659.350878] device bridge_slave_0 entered promiscuous mode [ 2659.409203] bridge0: port 2(bridge_slave_1) entered blocking state [ 2659.421867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2659.430325] device bridge_slave_1 entered promiscuous mode [ 2659.499641] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2659.550612] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2659.620756] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2659.629090] team0: Port device team_slave_0 added [ 2659.639471] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2659.647730] team0: Port device team_slave_1 added [ 2659.687077] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2659.711865] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2659.838224] device hsr_slave_0 entered promiscuous mode [ 2659.875599] device hsr_slave_1 entered promiscuous mode [ 2659.956956] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2659.972297] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2660.115687] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2660.522462] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2660.600602] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2660.621635] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2660.628405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2660.643955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2660.698391] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2660.707508] 8021q: adding VLAN 0 to HW filter on device team0 [ 2660.793342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2660.801677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2660.810959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2660.819662] bridge0: port 1(bridge_slave_0) entered blocking state [ 2660.827027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2660.878370] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2660.898906] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2660.907740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2660.929974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2660.943714] bridge0: port 2(bridge_slave_1) entered blocking state [ 2660.950247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2661.018167] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2661.025819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2661.059672] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2661.108001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2661.136602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2661.143985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2661.160548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2661.217324] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2661.229346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2661.237653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2661.253075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2661.321268] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2661.339177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2661.353022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2661.424104] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2661.431782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2661.442746] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2661.500646] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2661.509621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2661.610871] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2661.706337] 8021q: adding VLAN 0 to HW filter on device batadv0 03:55:49 executing program 3: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}], [{@measure='measure'}, {@euid_eq={'euid', 0x3d, r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'keyring'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/fuse\x00'}}, {@seclabel='seclabel'}, {@audit='audit'}, {@smackfstransmute={'smackfstransmute'}}]}}) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r4, r3, 0x0, 0x80000005) 03:55:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e00060000f000010000000153b4", 0x33fe0}], 0x1}, 0x0) 03:55:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 03:55:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000006253b4", 0x33fe0}], 0x1}, 0x0) 03:55:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3a8, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 2662.830865] kauditd_printk_skb: 71 callbacks suppressed [ 2662.830878] audit: type=1400 audit(2000001349.390:8090): avc: denied { create } for pid=22252 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2662.904021] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2662.962708] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2662.965659] audit: type=1400 audit(2000001349.430:8091): avc: denied { ioctl } for pid=22252 comm="syz-executor.5" path="socket:[526147]" dev="sockfs" ino=526147 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:55:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0) [ 2663.021459] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000000020000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2663.215727] audit: type=1400 audit(2000001349.450:8092): avc: denied { create } for pid=22249 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:55:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000006353b4", 0x33fe0}], 0x1}, 0x0) [ 2663.367199] audit: type=1400 audit(2000001349.450:8093): avc: denied { write } for pid=22249 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2663.523728] audit: type=1400 audit(2000001349.460:8095): avc: denied { create } for pid=22250 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2663.715106] audit: type=1400 audit(2000001349.460:8096): avc: denied { create } for pid=22251 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:55:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 2663.856880] audit: type=1400 audit(2000001349.480:8097): avc: denied { write } for pid=22250 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:55:50 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ftruncate(r1, 0x200003) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) munlock(&(0x7f00002a5000/0x12000)=nil, 0x12000) getsockopt$rose(0xffffffffffffffff, 0x104, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0xc) [ 2664.035844] audit: type=1400 audit(2000001349.450:8094): avc: denied { create } for pid=22254 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2664.227100] audit: type=1400 audit(2000001349.490:8098): avc: denied { create } for pid=22254 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2664.434457] audit: type=1400 audit(2000001349.490:8099): avc: denied { write } for pid=22251 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:55:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000006453b4", 0x33fe0}], 0x1}, 0x0) 03:55:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x5000000}, 0x0) 03:55:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[]}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c0000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="00000000000000000000000008000b0001000002"], 0x2c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmmsg$alg(r4, &(0x7f0000000140), 0x4924924924923aa, 0x0) [ 2665.486011] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2665.494873] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3a9, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 03:55:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000000030000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2665.802532] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2665.894583] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000007e53b4", 0x33fe0}], 0x1}, 0x0) [ 2666.299675] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2666.367837] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2666.442668] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2666.725945] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:55:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 03:55:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x6000000}, 0x0) 03:55:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x83) r2 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_buf(r2, 0x84, 0x7b, &(0x7f0000000100)=""/52, &(0x7f0000000080)=0x1b) [ 2667.855105] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2667.880728] kauditd_printk_skb: 138 callbacks suppressed [ 2667.880772] audit: type=1400 audit(2000001354.440:8238): avc: denied { map } for pid=22718 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2667.923231] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2667.971590] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000000040000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2668.031363] audit: type=1400 audit(2000001354.440:8239): avc: denied { map } for pid=22718 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:54 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) mount(&(0x7f0000000180)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='vfat\x00', 0x0, &(0x7f0000000240)='cpuset)system.\x00') r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r1, r3, 0xc, 0x1}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x10001, 0x424000) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'erspan0\x00', 0x100}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendfile(r0, r5, 0x0, 0x88001) [ 2668.184007] audit: type=1400 audit(2000001354.450:8240): avc: denied { map } for pid=22718 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2668.242717] audit: type=1400 audit(2000001354.450:8241): avc: denied { map } for pid=22718 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2668.317514] audit: type=1400 audit(2000001354.460:8242): avc: denied { map } for pid=22718 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2668.421355] audit: type=1400 audit(2000001354.470:8243): avc: denied { map } for pid=22718 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x0) [ 2668.510869] audit: type=1400 audit(2000001354.470:8244): avc: denied { map } for pid=22718 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2668.554408] audit: type=1400 audit(2000001354.500:8245): avc: denied { map } for pid=22718 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:55:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000008153b4", 0x33fe0}], 0x1}, 0x0) [ 2668.691240] audit: type=1400 audit(2000001354.500:8246): avc: denied { map } for pid=22718 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2668.752634] audit: type=1400 audit(2000001354.540:8247): avc: denied { map } for pid=22718 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2669.335809] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2669.344099] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3ab, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040)=0x800, 0x4) io_setup(0x2, &(0x7f0000000200)=0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@mcast1, @remote, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c20082}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000001c0)={0x100}, 0x4) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000140)={r6, 0x20}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000080)={r6, 0x2}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x806, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) io_submit(r3, 0x1, &(0x7f00000002c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r7, &(0x7f0000000040), 0xd2, 0x0, 0x0, 0x2}]) 03:55:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 03:55:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000000080000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2669.718495] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 03:55:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x8000000}, 0x0) [ 2669.767276] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000038e53b4", 0x33fe0}], 0x1}, 0x0) 03:55:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x9000000}, 0x0) [ 2671.333964] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2671.347204] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 03:55:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000000000a0000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2671.431557] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2671.459928] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:55:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="000002", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r4}, 0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={r4, 0xfffc, 0x40, 0x8, 0x7, 0xfd17}, 0x14) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffff7f00000005ffffa6fffff7", @ANYRESDEC=0x0, @ANYBLOB="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"], 0x3}}, 0x0) 03:55:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xa000000}, 0x0) 03:55:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x2) [ 2672.532817] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:55:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3ac, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:55:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e00060000000001000003d853b4", 0x33fe0}], 0x1}, 0x0) [ 2672.587862] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2672.608085] sctp: [Deprecated]: syz-executor.3 (pid 23377) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2672.608085] Use struct sctp_sack_info instead 03:55:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000000010d0000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2672.657847] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2673.047600] kauditd_printk_skb: 123 callbacks suppressed [ 2673.047619] audit: type=1400 audit(2000001359.610:8371): avc: denied { map } for pid=23397 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2673.186470] audit: type=1400 audit(2000001359.640:8372): avc: denied { map } for pid=23397 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2673.198274] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2673.246520] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2673.258530] sctp: [Deprecated]: syz-executor.3 (pid 23379) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2673.258530] Use struct sctp_sack_info instead [ 2673.307040] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2673.346162] audit: type=1400 audit(2000001359.670:8373): avc: denied { map } for pid=23397 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x4) 03:56:00 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000f80)={&(0x7f0000000040)={0x2, 0xffff, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@mask_cswp={0x58, 0x114, 0x9, {{}, 0x0, 0x0}}], 0x58}, 0x0) 03:56:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000fe353b4", 0x33fe0}], 0x1}, 0x0) [ 2673.555688] audit: type=1400 audit(2000001359.680:8374): avc: denied { map } for pid=23397 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2673.718570] audit: type=1400 audit(2000001359.690:8375): avc: denied { create } for pid=23393 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:56:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xb000000}, 0x0) [ 2673.925498] audit: type=1400 audit(2000001359.740:8376): avc: denied { write } for pid=23393 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2674.061248] audit: type=1400 audit(2000001359.740:8377): avc: denied { create } for pid=23408 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2674.191368] audit: type=1400 audit(2000001359.750:8378): avc: denied { map } for pid=23407 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2674.296724] audit: type=1400 audit(2000001359.780:8379): avc: denied { map } for pid=23397 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2674.389187] audit: type=1400 audit(2000001359.790:8380): avc: denied { write } for pid=23408 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:56:01 executing program 3: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x2004, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='setgroups\x00') sendfile(r0, r0, 0x0, 0x4000000000dc) [ 2674.836844] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:56:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000feb53b4", 0x33fe0}], 0x1}, 0x0) 03:56:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000000001a0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:56:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x1c, 0x12, @erspan={{0xc, 0x1, 'erspan\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @rand_addr=0x800}]}}}]}, 0x44}}, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8, 0x400) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000000c0)=0xa400, 0x4) [ 2675.993143] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2676.008705] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 03:56:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3ad, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:56:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x5) [ 2676.064160] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2676.095746] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2676.152481] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:56:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) [ 2676.211473] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:56:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e0006000000000100000ff353b4", 0x33fe0}], 0x1}, 0x0) [ 2676.388783] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:56:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600ffffff1f0000000153b4", 0x33fe0}], 0x1}, 0x0) 03:56:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x6) 03:56:03 executing program 3: r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xfffc) 03:56:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x10000000}, 0x0) [ 2678.056899] kauditd_printk_skb: 162 callbacks suppressed [ 2678.056915] audit: type=1400 audit(2000001364.610:8543): avc: denied { ioctl } for pid=23855 comm="syz-executor.5" path="socket:[527299]" dev="sockfs" ino=527299 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2678.248814] audit: type=1400 audit(2000001364.710:8544): avc: denied { create } for pid=23797 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2678.314022] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2678.348764] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2678.391197] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2678.392061] audit: type=1400 audit(2000001364.940:8545): avc: denied { create } for pid=23839 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:56:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000253b4", 0x33fe0}], 0x1}, 0x0) [ 2678.447056] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:56:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x20000000}, 0x0) 03:56:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f00000000c0)={0x63, 0x2, [0x82, 0x9, 0x428]}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000000)=0x5, &(0x7f0000000140)=0x4) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_S_SELECTION(r3, 0xc040563e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4, {0xffff, 0x7ff, 0x5, 0x4}}) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_pts(r2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x40000, 0x0) ioctl$TCSETSF(r4, 0x5403, &(0x7f0000000100)) [ 2678.504034] audit: type=1400 audit(2000001365.060:8546): avc: denied { map } for pid=24068 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000000200000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2678.631627] audit: type=1400 audit(2000001365.080:8547): avc: denied { map } for pid=24068 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2678.812876] audit: type=1400 audit(2000001365.100:8548): avc: denied { map } for pid=24068 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2678.937167] audit: type=1400 audit(2000001365.130:8549): avc: denied { map } for pid=24068 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2679.098730] audit: type=1400 audit(2000001365.180:8550): avc: denied { map } for pid=24068 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2679.232104] audit: type=1400 audit(2000001365.240:8551): avc: denied { map } for pid=24068 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2679.362830] audit: type=1400 audit(2000001365.240:8552): avc: denied { map } for pid=24068 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2679.687824] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2679.709800] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:56:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3ae, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:56:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x8) 03:56:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0xffffffffffffff7c) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r2 = getpid() tkill(r2, 0x800000015) capget(&(0x7f00000000c0)={0x20071026, r2}, &(0x7f0000000140)={0x7fffffff, 0x1ff, 0x7f, 0x71, 0x5aa, 0x2}) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x20, 0x0, 0x2ade688be76faa81, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x20}]}, 0x20}}, 0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r3, 0x80003) sendfile(r0, r3, 0x0, 0x8000fffffffe) [ 2679.746186] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2679.776485] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2679.834222] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:56:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000353b4", 0x33fe0}], 0x1}, 0x0) [ 2679.938553] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:56:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x9) 03:56:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000000250000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2680.429014] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:56:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x48000000}, 0x0) 03:56:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0xa) 03:56:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000553b4", 0x33fe0}], 0x1}, 0x0) [ 2681.999502] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:56:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000000350000000153b4", 0x33fe0}], 0x1}, 0x0) 03:56:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x4c000000}, 0x0) 03:56:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 03:56:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3af, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2683.010481] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2683.021164] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2683.036893] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:56:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e0006000000003f0000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2683.083355] kauditd_printk_skb: 138 callbacks suppressed [ 2683.083369] audit: type=1400 audit(2000001369.640:8691): avc: denied { create } for pid=24425 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:56:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0xb) 03:56:09 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000380)=@hci, 0x80) sendmsg$can_bcm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000540)={0x5, 0x800, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "5deca2c94acb507247cc3684d1523426a929384a26451e7a4ffcd8265ebb8cbb1346759291752c6ce386315560dcc0bfc9e50bae2febd1c4b58c81684a168e08"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000000c0)=ANY=[@ANYBLOB="05000000c60800"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000090000000000000000000000005deca2c94acb507247cc3684d1523426a929384a25451e7a4ffcd8265ebb8cbb1346729291752c6ce386311c00"/80], 0x38}}, 0x0) [ 2683.531303] audit: type=1400 audit(2000001370.090:8692): avc: denied { map } for pid=24614 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000853b4", 0x33fe0}], 0x1}, 0x0) [ 2683.711272] audit: type=1400 audit(2000001370.140:8693): avc: denied { map } for pid=24614 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2683.792080] validate_nla: 2 callbacks suppressed [ 2683.792090] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2683.834919] audit: type=1400 audit(2000001370.140:8694): avc: denied { map } for pid=24614 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0xe) [ 2684.004814] audit: type=1400 audit(2000001370.140:8695): avc: denied { map } for pid=24614 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:56:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000000400000000153b4", 0x33fe0}], 0x1}, 0x0) [ 2684.204992] audit: type=1400 audit(2000001370.180:8696): avc: denied { map } for pid=24626 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2684.331320] audit: type=1400 audit(2000001370.190:8697): avc: denied { map } for pid=24626 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2684.441431] audit: type=1400 audit(2000001370.200:8698): avc: denied { map } for pid=24626 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2684.585867] audit: type=1400 audit(2000001370.210:8699): avc: denied { map } for pid=24626 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2684.725622] audit: type=1400 audit(2000001370.230:8700): avc: denied { map } for pid=24614 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2685.165909] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2685.188402] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2685.242060] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2685.250948] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:56:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x68000000}, 0x0) [ 2685.754361] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2685.787660] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:56:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000953b4", 0x33fe0}], 0x1}, 0x0) 03:56:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x3b0, &(0x7f0000000100)={&(0x7f0000000000)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@rand_addr="4cbf36689ddb83b387b7e4d5d53bfe91"}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 2685.884697] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2685.894062] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:56:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0xf) 03:56:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041a4865160b00010040000000000000190e000600000000520000000153b4", 0x33fe0}], 0x1}, 0x0) 03:56:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000153b4", 0x2e}], 0x1, 0x0, 0x0, 0x6b6b6b00}, 0x0) 03:56:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9041b4865160b00010040000000000000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x10) 03:56:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000000000000190e000600000000010000000a53b4", 0x33fe0}], 0x1}, 0x0) [ 2687.685169] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 2688.236744] kauditd_printk_skb: 131 callbacks suppressed [ 2688.236758] audit: type=1400 audit(2000001374.800:8832): avc: denied { create } for pid=25118 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2688.280520] audit: type=1400 audit(2000001374.840:8833): avc: denied { map } for pid=25192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2688.314963] audit: type=1400 audit(2000001374.840:8834): avc: denied { map } for pid=25192 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2688.338918] audit: type=1400 audit(2000001374.840:8835): avc: denied { map } for pid=25192 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2688.365481] audit: type=1400 audit(2000001374.840:8836): avc: denied { map } for pid=25192 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2688.393800] audit: type=1400 audit(2000001374.840:8837): avc: denied { map } for pid=25192 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2688.432358] audit: type=1400 audit(2000001374.840:8838): avc: denied { map } for pid=25192 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2688.574222] audit: type=1400 audit(2000001374.840:8839): avc: denied { map } for pid=25192 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2688.678796] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 2688.688912] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 2688.689537] audit: type=1400 audit(2000001374.870:8840): avc: denied { map } for pid=25192 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2688.724313] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2688.809164] audit: type=1400 audit(2000001374.870:8841): avc: denied { map } for pid=25192 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2842.337012] INFO: task syz-executor.3:24645 blocked for more than 140 seconds. [ 2842.344457] Not tainted 4.19.81 #0 [ 2842.350736] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2842.355566] kobject: 'phy314' (0000000075ce8ad6): kobject_uevent_env [ 2842.360893] syz-executor.3 D29496 24645 21990 0x00000004 [ 2842.371406] Call Trace: [ 2842.373141] kobject: 'phy314' (0000000075ce8ad6): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim315/ieee80211/phy314' [ 2842.374019] __schedule+0x866/0x1dc0 [ 2842.374042] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2842.374057] ? rwsem_down_write_failed+0x764/0xc30 [ 2842.393790] kobject: 'ieee80211' (00000000dc7bbb79): kobject_cleanup, parent (null) [ 2842.397296] ? _raw_spin_unlock_irq+0x28/0x90 [ 2842.401993] kobject: 'ieee80211' (00000000dc7bbb79): calling ktype release [ 2842.414465] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2842.423385] kobject: 'ieee80211': free name [ 2842.425319] schedule+0x92/0x1c0 [ 2842.430247] kobject: 'hwsim315' (000000007ba21ab3): kobject_uevent_env [ 2842.433329] rwsem_down_write_failed+0x774/0xc30 [ 2842.433347] ? rwsem_down_read_failed+0x3c0/0x3c0 [ 2842.433363] ? __debug_object_init+0x190/0xc30 [ 2842.433382] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2842.433407] call_rwsem_down_write_failed+0x17/0x30 [ 2842.433420] ? call_rwsem_down_write_failed+0x17/0x30 [ 2842.433437] down_write+0x53/0x90 [ 2842.433449] ? register_netdevice_notifier+0x7e/0x630 [ 2842.433463] register_netdevice_notifier+0x7e/0x630 [ 2842.433478] ? __lockdep_init_map+0x10c/0x5b0 [ 2842.433489] ? __dev_close_many+0x300/0x300 [ 2842.433503] ? __lockdep_init_map+0x10c/0x5b0 [ 2842.443551] kobject: 'hwsim315' (000000007ba21ab3): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim315' [ 2842.451063] bcm_init+0x1a8/0x220 [ 2842.470885] kobject: 'hwsim315' (000000007ba21ab3): kobject_uevent_env [ 2842.475732] ? canbcm_pernet_init+0x90/0x90 [ 2842.511727] kobject: 'hwsim315' (000000007ba21ab3): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim315' [ 2842.513793] can_create+0x288/0x4a0 [ 2842.522852] kobject: 'hwsim315' (000000007ba21ab3): kobject_cleanup, parent (null) [ 2842.530205] __sock_create+0x3d8/0x730 [ 2842.563394] __sys_socket+0x103/0x220 [ 2842.569317] ? move_addr_to_kernel+0x80/0x80 [ 2842.573207] kobject: 'hwsim315' (000000007ba21ab3): calling ktype release [ 2842.573771] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2842.581208] kobject: 'hwsim315': free name [ 2842.590419] kobject: 'phy314' (0000000075ce8ad6): kobject_cleanup, parent (null) [ 2842.593315] ? do_syscall_64+0x26/0x620 [ 2842.600184] kobject: 'phy314' (0000000075ce8ad6): calling ktype release [ 2842.610366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2842.612751] kobject: 'rfkill319' (0000000057a06ae4): kobject_cleanup, parent (null) [ 2842.616096] ? do_syscall_64+0x26/0x620 [ 2842.624652] kobject: 'rfkill319' (0000000057a06ae4): calling ktype release [ 2842.634628] __x64_sys_socket+0x73/0xb0 [ 2842.637585] kobject: 'rfkill319': free name [ 2842.639916] do_syscall_64+0xfd/0x620 [ 2842.644061] kobject: 'phy314': free name [ 2842.652469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2842.659873] RIP: 0033:0x459f49 [ 2842.663220] Code: Bad RIP value. [ 2842.666920] RSP: 002b:00007fca38a39c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2842.674806] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 2842.682302] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 2842.690031] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2842.697477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca38a3a6d4 [ 2842.704965] R13: 00000000004c9052 R14: 00000000004e06a8 R15: 00000000ffffffff [ 2842.712389] INFO: task syz-executor.3:24646 blocked for more than 140 seconds. [ 2842.720126] Not tainted 4.19.81 #0 [ 2842.724213] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2842.732574] syz-executor.3 D29496 24646 21990 0x00000004 [ 2842.738411] Call Trace: [ 2842.741183] __schedule+0x866/0x1dc0 [ 2842.745100] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2842.750222] ? rwsem_down_write_failed+0x764/0xc30 [ 2842.755341] ? _raw_spin_unlock_irq+0x28/0x90 [ 2842.759859] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2842.764665] schedule+0x92/0x1c0 [ 2842.768143] rwsem_down_write_failed+0x774/0xc30 [ 2842.773065] ? rwsem_down_read_failed+0x3c0/0x3c0 [ 2842.778154] ? __debug_object_init+0x190/0xc30 [ 2842.782764] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2842.788184] call_rwsem_down_write_failed+0x17/0x30 [ 2842.793585] ? call_rwsem_down_write_failed+0x17/0x30 [ 2842.798995] down_write+0x53/0x90 [ 2842.802591] ? register_netdevice_notifier+0x7e/0x630 [ 2842.807995] register_netdevice_notifier+0x7e/0x630 [ 2842.813113] ? __lockdep_init_map+0x10c/0x5b0 [ 2842.817795] ? __dev_close_many+0x300/0x300 [ 2842.822334] ? __lockdep_init_map+0x10c/0x5b0 [ 2842.827028] bcm_init+0x1a8/0x220 [ 2842.831508] ? canbcm_pernet_init+0x90/0x90 [ 2842.836494] can_create+0x288/0x4a0 [ 2842.840214] __sock_create+0x3d8/0x730 [ 2842.844410] __sys_socket+0x103/0x220 [ 2842.848396] ? move_addr_to_kernel+0x80/0x80 [ 2842.852903] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2842.857970] ? do_syscall_64+0x26/0x620 [ 2842.862043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2842.867581] ? do_syscall_64+0x26/0x620 [ 2842.871707] __x64_sys_socket+0x73/0xb0 [ 2842.875825] do_syscall_64+0xfd/0x620 [ 2842.879718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2842.885096] RIP: 0033:0x459f49 [ 2842.888402] Code: Bad RIP value. [ 2842.891831] RSP: 002b:00007fca38a18c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2842.899891] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459f49 [ 2842.907387] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 2842.914847] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2842.922544] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca38a196d4 [ 2842.929990] R13: 00000000004c9052 R14: 00000000004e06a8 R15: 00000000ffffffff [ 2842.937444] [ 2842.937444] Showing all locks held in the system: [ 2842.944021] 1 lock held by khungtaskd/1038: [ 2842.948619] #0: 0000000058ac9bed (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 2842.957402] 1 lock held by rsyslogd/7548: [ 2842.961691] #0: 000000008d5c779c (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 2842.969781] 2 locks held by getty/7670: [ 2842.973823] #0: 000000001adb5b9b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2842.982386] #1: 00000000224cc980 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2842.991561] 2 locks held by getty/7671: [ 2842.995656] #0: 000000001b03080e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2843.004084] #1: 0000000080939f17 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2843.013170] 2 locks held by getty/7672: [ 2843.017193] #0: 0000000041771eb6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2843.025615] #1: 000000005f47d7f8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2843.034652] 2 locks held by getty/7673: [ 2843.038726] #0: 000000005bacc22f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2843.047199] #1: 00000000a00ee3ac (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2843.056515] 2 locks held by getty/7674: [ 2843.060611] #0: 00000000c93f1bc2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2843.069415] #1: 00000000d7e2f6f6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2843.078441] 2 locks held by getty/7675: [ 2843.083055] #0: 00000000a2e323ef (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2843.091636] #1: 00000000c3f1698d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2843.100943] 2 locks held by getty/7676: [ 2843.105066] #0: 00000000ed7e00ac (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2843.113589] #1: 0000000074a8770d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2843.122639] 5 locks held by kworker/u4:5/7786: [ 2843.127339] #0: 000000002bd94453 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x87e/0x1750 [ 2843.137735] #1: 0000000058a664c1 (net_cleanup_work){+.+.}, at: process_one_work+0x8b4/0x1750 [ 2843.146855] #2: 00000000a8524985 (pernet_ops_rwsem){++++}, at: cleanup_net+0xae/0x960 [ 2843.155105] #3: 000000001ff8edbb (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2843.162592] #4: 000000000c8135b2 (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x59e/0x7f0 [ 2843.173577] 1 lock held by syz-executor.3/24645: [ 2843.178483] #0: 00000000a8524985 (pernet_ops_rwsem){++++}, at: register_netdevice_notifier+0x7e/0x630 [ 2843.188122] 1 lock held by syz-executor.3/24646: [ 2843.192888] #0: 00000000a8524985 (pernet_ops_rwsem){++++}, at: register_netdevice_notifier+0x7e/0x630 [ 2843.202639] [ 2843.204283] ============================================= [ 2843.204283] [ 2843.212517] NMI backtrace for cpu 0 [ 2843.216376] CPU: 0 PID: 1038 Comm: khungtaskd Not tainted 4.19.81 #0 [ 2843.222899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2843.232257] Call Trace: [ 2843.234855] dump_stack+0x172/0x1f0 [ 2843.238509] nmi_cpu_backtrace.cold+0x63/0xa4 [ 2843.243065] ? lapic_can_unplug_cpu.cold+0x47/0x47 [ 2843.248005] nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 [ 2843.253285] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2843.258477] watchdog+0x9df/0xee0 [ 2843.261926] kthread+0x354/0x420 [ 2843.265297] ? reset_hung_task_detector+0x30/0x30 [ 2843.270144] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2843.275704] ret_from_fork+0x24/0x30 [ 2843.279651] Sending NMI from CPU 0 to CPUs 1: [ 2843.284797] NMI backtrace for cpu 1 [ 2843.284802] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.81 #0 [ 2843.284808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2843.284812] RIP: 0010:__sanitizer_cov_trace_pc+0x1/0x50 [ 2843.284823] Code: bc f4 ff ff ff e8 73 65 ea ff 48 c7 05 d4 41 cd 08 00 00 00 00 e9 ca e9 ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 <48> 89 e5 48 8b 75 08 65 48 8b 04 25 40 ee 01 00 65 8b 15 78 26 97 [ 2843.284826] RSP: 0018:ffff8880aa27fcf8 EFLAGS: 00000046 [ 2843.284834] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff816ffd90 [ 2843.284838] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2843.284843] RBP: ffff8880aa27fd38 R08: ffff8880aa2703c0 R09: 0000000000000000 [ 2843.284848] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000282 [ 2843.284852] R13: ffffffff88724650 R14: 0000000000000000 R15: ffff8880aa2703c0 [ 2843.284857] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2843.284861] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2843.284866] CR2: 00000000014d9ff0 CR3: 0000000092e62000 CR4: 00000000001426e0 [ 2843.284871] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2843.284875] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2843.284878] Call Trace: [ 2843.284882] ? trace_hardirqs_off+0x76/0x220 [ 2843.284885] ? default_idle+0x55/0x320 [ 2843.284888] rcu_idle_exit+0x7b/0x360 [ 2843.284891] do_idle+0x2db/0x4d0 [ 2843.284894] ? retint_kernel+0x2d/0x2d [ 2843.284898] ? arch_cpu_idle_exit+0x80/0x80 [ 2843.284901] cpu_startup_entry+0xc8/0xe0 [ 2843.284904] ? cpu_in_idle+0x20/0x20 [ 2843.284908] ? setup_APIC_timer+0x1aa/0x200 [ 2843.284911] start_secondary+0x3e8/0x5b0 [ 2843.284915] ? set_cpu_sibling_map+0x1860/0x1860 [ 2843.284918] secondary_startup_64+0xa4/0xb0 [ 2843.462614] kobject: 'batman_adv' (00000000c1c70637): kobject_uevent_env [ 2843.468784] Kernel panic - not syncing: hung_task: blocked tasks [ 2843.469766] kobject: 'batman_adv' (00000000c1c70637): kobject_uevent_env: filter function caused the event to drop! [ 2843.475641] CPU: 0 PID: 1038 Comm: khungtaskd Not tainted 4.19.81 #0 [ 2843.475649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2843.475652] Call Trace: [ 2843.475675] dump_stack+0x172/0x1f0 [ 2843.475696] panic+0x26a/0x50e [ 2843.475710] ? __warn_printk+0xf3/0xf3 [ 2843.475722] ? lapic_can_unplug_cpu.cold+0x47/0x47 [ 2843.475742] ? ___preempt_schedule+0x16/0x18 [ 2843.486481] kobject: 'batman_adv' (00000000c1c70637): kobject_cleanup, parent (null) [ 2843.492812] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 2843.502206] kobject: 'batman_adv' (00000000c1c70637): calling ktype release [ 2843.504740] ? nmi_trigger_cpumask_backtrace+0x1c1/0x1f8 [ 2843.504752] ? nmi_trigger_cpumask_backtrace+0x1cb/0x1f8 [ 2843.504764] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 2843.504785] watchdog+0x9f0/0xee0 [ 2843.508420] kobject: (00000000c1c70637): dynamic_kobj_release [ 2843.511579] kthread+0x354/0x420 [ 2843.515502] kobject: 'batman_adv': free name [ 2843.520359] ? reset_hung_task_detector+0x30/0x30 [ 2843.525833] kobject: 'rx-0' (0000000054f660cd): kobject_cleanup, parent 00000000bc5909b6 [ 2843.533561] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2843.533579] ret_from_fork+0x24/0x30 [ 2843.539268] kobject: 'rx-0' (0000000054f660cd): auto cleanup 'remove' event [ 2843.548204] Kernel Offset: disabled [ 2843.614764] Rebooting in 86400 seconds..